1. Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER V
SUBJECT CODE & NAME
CREDIT 4
BK ID
MAX.MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately
of 400 words. Each question is followed by evaluation scheme.
Q.1 Describe about Wireless Communication. Explain its advantages.
Answer: - Wireless communication is the transfer of information between two or more points that are
not connected by an electrical conductor. The most common wireless technologies use radio. With radio
waves distances can be short, such as a few meters for television or as far as thousands or even millions
of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and
portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs),
and wireless networking. Other examples of
Q.2 Describe any five GSM PLMN basic services
Answer: - A public land mobile network (PLMN) is a regulatory term in telecommunications. A PLMN is a
network that is established and operated by an administration or by a recognized operating agency
(ROA) for the specific purpose of providing land mobile telecommunications services to the public.[1]
A PLMN is identified by the Mobile Country Code (
2. Q.3 Differentiate between BSC and MSC protocols
Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of
interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio resources
at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management
(BTSM). The BTS management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS
and the BTS. These services include controlling the initial access to the system, paging for MT calls, the
handover of calls between cell sites, power control, and call termination. The RR protocols provide the
procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some
radio resource management in place for the frequency coordination, frequency allocation, and the
management of the overall network layer for the Layer 2
Q.4 What is CDMA? Explain the history of CDMA.
Answer: - CDMA:- Code division multiple access (CDMA) is a channel access method used by various
radio communication technologies.CDMA is an example of multiple access , which is where several
transmitters can send information simultaneously over a single communication channel. This allows
several users to share a band of frequencies (see bandwidth). To permit this to be achieved without
undue interference between the users, CDMA employs spread-spectrum technology and a special
coding scheme (where each transmitter is assigned a code).
CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA.
CDMA spreads data out over the channel after the
Q.5 Explain the following:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate
weakening of the algorithm for certain export regions. A5 was developed in 1987, when GSM was not
yet considered for use outside Europe, and A5 was developed in 1989. Though both were initially kept
secret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in
1999 by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers relied on A5
to protect the confidentiality of their voice
A8 algorithm for key generation
3. This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to
generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile
Station ) and the GSM network. A variety of security algorithms are used to provide authentication,
cipher key generation, integrity and radio link privacy to users on mobile networks
Q.6 List and explain the different path loss models
Answer:- Path loss models:- Path loss (or path attenuation) is the reduction in power density
(attenuation ) of an electromagnetic wave as it propagates through space. Path loss is a major
component in the analysis and design of the link budget of a telecommunication system.
This term is commonly used in wireless communications and signal propagation . Path loss may be due
to many effects, such as free-space loss , refraction , diffraction , reflection , aperture -medium coupling
loss , and absorption . Path loss is also
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601