SlideShare a Scribd company logo
1 of 3
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER V
SUBJECT CODE & NAME
CREDIT 4
BK ID
MAX.MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately
of 400 words. Each question is followed by evaluation scheme.
Q.1 Describe about Wireless Communication. Explain its advantages.
Answer: - Wireless communication is the transfer of information between two or more points that are
not connected by an electrical conductor. The most common wireless technologies use radio. With radio
waves distances can be short, such as a few meters for television or as far as thousands or even millions
of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and
portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs),
and wireless networking. Other examples of
Q.2 Describe any five GSM PLMN basic services
Answer: - A public land mobile network (PLMN) is a regulatory term in telecommunications. A PLMN is a
network that is established and operated by an administration or by a recognized operating agency
(ROA) for the specific purpose of providing land mobile telecommunications services to the public.[1]
A PLMN is identified by the Mobile Country Code (
Q.3 Differentiate between BSC and MSC protocols
Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of
interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio resources
at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management
(BTSM). The BTS management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS
and the BTS. These services include controlling the initial access to the system, paging for MT calls, the
handover of calls between cell sites, power control, and call termination. The RR protocols provide the
procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some
radio resource management in place for the frequency coordination, frequency allocation, and the
management of the overall network layer for the Layer 2
Q.4 What is CDMA? Explain the history of CDMA.
Answer: - CDMA:- Code division multiple access (CDMA) is a channel access method used by various
radio communication technologies.CDMA is an example of multiple access , which is where several
transmitters can send information simultaneously over a single communication channel. This allows
several users to share a band of frequencies (see bandwidth). To permit this to be achieved without
undue interference between the users, CDMA employs spread-spectrum technology and a special
coding scheme (where each transmitter is assigned a code).
CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA.
CDMA spreads data out over the channel after the
Q.5 Explain the following:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate
weakening of the algorithm for certain export regions. A5 was developed in 1987, when GSM was not
yet considered for use outside Europe, and A5 was developed in 1989. Though both were initially kept
secret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in
1999 by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers relied on A5
to protect the confidentiality of their voice
A8 algorithm for key generation
This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to
generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile
Station ) and the GSM network. A variety of security algorithms are used to provide authentication,
cipher key generation, integrity and radio link privacy to users on mobile networks
Q.6 List and explain the different path loss models
Answer:- Path loss models:- Path loss (or path attenuation) is the reduction in power density
(attenuation ) of an electromagnetic wave as it propagates through space. Path loss is a major
component in the analysis and design of the link budget of a telecommunication system.
This term is commonly used in wireless communications and signal propagation . Path loss may be due
to many effects, such as free-space loss , refraction , diffraction , reflection , aperture -medium coupling
loss , and absorption . Path loss is also
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

More Related Content

What's hot

Cellular mobile communication
Cellular mobile communicationCellular mobile communication
Cellular mobile communicationAJAL A J
 
Mobile communication process or cellular network
Mobile communication process or cellular networkMobile communication process or cellular network
Mobile communication process or cellular networkSudhanshu Jha
 
G second generation network
G second generation networkG second generation network
G second generation networkSharmaine Carlos
 
Handover wcdma gsm
Handover wcdma gsmHandover wcdma gsm
Handover wcdma gsmprothanh
 
Mobile communication lectures
Mobile communication lecturesMobile communication lectures
Mobile communication lecturesmarwaeng
 
The impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3gThe impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3gPrecious Kamoto
 
Comparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiComparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiNajmulHoqueMunshi
 
CDMA cellular radio network
CDMA cellular radio networkCDMA cellular radio network
CDMA cellular radio networkoDesk
 
Mobile communication fundamental
Mobile communication fundamentalMobile communication fundamental
Mobile communication fundamentalTHANDAIAH PRABU
 
Cellular Communication Report
Cellular Communication ReportCellular Communication Report
Cellular Communication ReportPrashant Gajendra
 
Fookune ndss gsm (1)
Fookune ndss gsm (1)Fookune ndss gsm (1)
Fookune ndss gsm (1)Bhuwan Gupta
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
cellular wirelessnetworks
 cellular wirelessnetworks cellular wirelessnetworks
cellular wirelessnetworksSrinivasa Rao
 
Cellular Networks Presentation in distributed systems, Mobile Networks
Cellular Networks Presentation in distributed systems, Mobile NetworksCellular Networks Presentation in distributed systems, Mobile Networks
Cellular Networks Presentation in distributed systems, Mobile NetworksAhmad Yar
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingSwapnali Pawar
 

What's hot (18)

Cellular mobile communication
Cellular mobile communicationCellular mobile communication
Cellular mobile communication
 
Mobile communication process or cellular network
Mobile communication process or cellular networkMobile communication process or cellular network
Mobile communication process or cellular network
 
Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
G second generation network
G second generation networkG second generation network
G second generation network
 
Handover wcdma gsm
Handover wcdma gsmHandover wcdma gsm
Handover wcdma gsm
 
Mobile communication lectures
Mobile communication lecturesMobile communication lectures
Mobile communication lectures
 
The impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3gThe impact of intermodulation interference in superimposed 2 g and 3g
The impact of intermodulation interference in superimposed 2 g and 3g
 
Comparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiComparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshi
 
CDMA cellular radio network
CDMA cellular radio networkCDMA cellular radio network
CDMA cellular radio network
 
Mobile communication fundamental
Mobile communication fundamentalMobile communication fundamental
Mobile communication fundamental
 
Cellular Communication Report
Cellular Communication ReportCellular Communication Report
Cellular Communication Report
 
Fookune ndss gsm (1)
Fookune ndss gsm (1)Fookune ndss gsm (1)
Fookune ndss gsm (1)
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Wc unit1
Wc unit1Wc unit1
Wc unit1
 
cellular wirelessnetworks
 cellular wirelessnetworks cellular wirelessnetworks
cellular wirelessnetworks
 
Cellular Networks Presentation in distributed systems, Mobile Networks
Cellular Networks Presentation in distributed systems, Mobile NetworksCellular Networks Presentation in distributed systems, Mobile Networks
Cellular Networks Presentation in distributed systems, Mobile Networks
 
Unit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile ComputingUnit 1-Introduction to Mobile Computing
Unit 1-Introduction to Mobile Computing
 
Cellular Communication
Cellular CommunicationCellular Communication
Cellular Communication
 

Similar to Mca5032 wireless and mobile communication

Improving the quality of gsm servece
Improving the quality of gsm serveceImproving the quality of gsm servece
Improving the quality of gsm serveceMohamed Luay
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-desmumbahelp
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-desmumbahelp
 
PCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESPCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESrashmi_surekha
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxahmadfaisal744721
 
GSM Among Other Systems
GSM Among Other SystemsGSM Among Other Systems
GSM Among Other SystemsSokunth Che
 
Comparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiComparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiNajmulHoqueMunshi
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
3G report file
3G report file3G report file
3G report fileVINEETH M
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolutionSidra Mallick
 
Mobile Wireless Communications.pdf
Mobile Wireless Communications.pdfMobile Wireless Communications.pdf
Mobile Wireless Communications.pdfSusieMaestre1
 
Priaynshu sharma
Priaynshu sharma Priaynshu sharma
Priaynshu sharma spriyanshu
 
CMC notes Unit 5.pptx
CMC notes Unit 5.pptxCMC notes Unit 5.pptx
CMC notes Unit 5.pptxDRKSHASHIDHAR
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applicationskkkseld
 
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...Amitesh Raikwar
 

Similar to Mca5032 wireless and mobile communication (20)

Cdma Vs Gsm1
Cdma Vs Gsm1Cdma Vs Gsm1
Cdma Vs Gsm1
 
C D M A Vs Gsm1
C D M A Vs  Gsm1C D M A Vs  Gsm1
C D M A Vs Gsm1
 
Gsm Vs Cdma
Gsm Vs CdmaGsm Vs Cdma
Gsm Vs Cdma
 
Improving the quality of gsm servece
Improving the quality of gsm serveceImproving the quality of gsm servece
Improving the quality of gsm servece
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-de
 
Bt0086 mobile computing-de
Bt0086 mobile computing-deBt0086 mobile computing-de
Bt0086 mobile computing-de
 
PCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIESPCM, CDMA AND GSM TECHNOLOGIES
PCM, CDMA AND GSM TECHNOLOGIES
 
Chapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptxChapter 3v3 Mobile communication systems.pptx
Chapter 3v3 Mobile communication systems.pptx
 
GSM Among Other Systems
GSM Among Other SystemsGSM Among Other Systems
GSM Among Other Systems
 
Comparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshiComparison between gsm & cdma najmul hoque munshi
Comparison between gsm & cdma najmul hoque munshi
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
3G report file
3G report file3G report file
3G report file
 
Lec 1 and 2 evolution
Lec 1 and 2 evolutionLec 1 and 2 evolution
Lec 1 and 2 evolution
 
Mobile Wireless Communications.pdf
Mobile Wireless Communications.pdfMobile Wireless Communications.pdf
Mobile Wireless Communications.pdf
 
Priaynshu sharma
Priaynshu sharma Priaynshu sharma
Priaynshu sharma
 
CMC notes Unit 5.pptx
CMC notes Unit 5.pptxCMC notes Unit 5.pptx
CMC notes Unit 5.pptx
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 
Mobile Multi Media Applications
Mobile Multi Media ApplicationsMobile Multi Media Applications
Mobile Multi Media Applications
 
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
 
What is GSM meaning
What is GSM meaningWhat is GSM meaning
What is GSM meaning
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Mca5032 wireless and mobile communication

  • 1. Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 ASSIGNMENT PROGRAM MCA(REVISED FALL 2012) SEMESTER V SUBJECT CODE & NAME CREDIT 4 BK ID MAX.MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Q.1 Describe about Wireless Communication. Explain its advantages. Answer: - Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of Q.2 Describe any five GSM PLMN basic services Answer: - A public land mobile network (PLMN) is a regulatory term in telecommunications. A PLMN is a network that is established and operated by an administration or by a recognized operating agency (ROA) for the specific purpose of providing land mobile telecommunications services to the public.[1] A PLMN is identified by the Mobile Country Code (
  • 2. Q.3 Differentiate between BSC and MSC protocols Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management (BTSM). The BTS management layer is a relay function at the BTS to the BSC. The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS and the BTS. These services include controlling the initial access to the system, paging for MT calls, the handover of calls between cell sites, power control, and call termination. The RR protocols provide the procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some radio resource management in place for the frequency coordination, frequency allocation, and the management of the overall network layer for the Layer 2 Q.4 What is CDMA? Explain the history of CDMA. Answer: - CDMA:- Code division multiple access (CDMA) is a channel access method used by various radio communication technologies.CDMA is an example of multiple access , which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). To permit this to be achieved without undue interference between the users, CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code). CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA. CDMA spreads data out over the channel after the Q.5 Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate weakening of the algorithm for certain export regions. A5 was developed in 1987, when GSM was not yet considered for use outside Europe, and A5 was developed in 1989. Though both were initially kept secret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in 1999 by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers relied on A5 to protect the confidentiality of their voice A8 algorithm for key generation
  • 3. This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile Station ) and the GSM network. A variety of security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks Q.6 List and explain the different path loss models Answer:- Path loss models:- Path loss (or path attenuation) is the reduction in power density (attenuation ) of an electromagnetic wave as it propagates through space. Path loss is a major component in the analysis and design of the link budget of a telecommunication system. This term is commonly used in wireless communications and signal propagation . Path loss may be due to many effects, such as free-space loss , refraction , diffraction , reflection , aperture -medium coupling loss , and absorption . Path loss is also Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601