Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER V
SUBJECT CODE & NAME MCA5032- WIRELESS AND MOBILE
COMMUNICATION
CREDIT 4
BK ID
MAX.MARKS 60
Note:Answer all questions.Kindlynote that answersfor 10 marks questionsshouldbe approximately
of 400 words. Each questionis followedbyevaluationscheme.
Q.1 Describe any five GSMPLMN basic services
Answer: - A publiclandmobile network(PLMN) isa regulatorytermintelecommunications.A PLMN isa
networkthatisestablishedandoperatedbyanadministrationorbyarecognizedoperatingagency (ROA)
for the specificpurpose of providinglandmobile telecommunicationsservicestothe public.[1]
A PLMN isidentifiedbythe Mobile CountryCode (
Q.2 Describe about WirelessCommunication.Explainitsadvantages.
Answer: - Wireless communication is the transfer of information between two or more points that are
not connectedbyan electrical conductor.The mostcommonwirelesstechnologiesuse radio.Withradio
wavesdistancescan be short, such as a few metersfor televisionoras far as thousandsor evenmillions
of kilometers for deep-space radio communications. It encompasses varioustypes of fixed, mobile, and
portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs),
and wirelessnetworking.Otherexamplesof
Q.3 Differentiate betweenBSCandMSC protocols
Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of
interfacesisused.The Abisinterface isusedbetweenthe BTS and BSC. At this level,the radioresources
at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management
(BTSM).The BTS managementlayerisarelayfunctionatthe BTS to the BSC.
The RR protocols are responsible for the allocationand reallocation of traffic channelsbetween the MS
and the BTS. These services include controlling the initial access to the system, paging for MT calls, the
handover of calls between cell sites, power control, and call termination. The RR protocols provide the
proceduresforthe use,allocation,reallocation,andrelease of the GSM channels.The BSCstill has some
radio resource management in place for the frequency coordination, frequency allocation, and the
managementof the overall networklayerforthe Layer2
Q.4 What isCDMA? Explain the history of CDMA.
Answer:- CDMA:- Code divisionmultipleaccess(CDMA) isachannel accessmethod usedbyvariousradio
communicationtechnologies.CDMA isanexample of multipleaccess,whichiswhere several transmitters
can send information simultaneously over a single communication channel.This allows several users to
share a band of frequencies (see bandwidth). To permit thisto be achieved without undue interference
between the users, CDMA employs spread-spectrum technology and a special coding scheme (where
each transmitterisassignedacode).
CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA.
CDMA spreadsdata out overthe channel afterthe
Q.5 Explainthe following:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate
weakeningof the algorithmforcertainexportregions. A5wasdevelopedin1987,whenGSMwasnotyet
consideredforuse outsideEurope,and A5wasdevelopedin1989.Thoughbothwere initiallykeptsecret,
the general design was leaked in 1994 and the algorithms were entirely reverse engineered in 1999 by
Marc Bricenofroma GSM telephone.In2000, around 130 millionGSMcustomersreliedonA5toprotect
the confidentialityof theirvoice
A8 algorithmfor key generation
This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to
generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile
Station) andthe GSM network. A varietyof securityalgorithmsare usedtoprovideauthentication,cipher
keygeneration,integrityandradiolinkprivacytousersonmobile networks
Q.6 List and explainthe differentpath lossmodels
Answer:- Pathlossmodels:- Pathloss(orpathattenuation)isthe reductioninpowerdensity(attenuation
) of an electromagnetic wave as it propagates through space. Path loss is a major component in the
analysisanddesignof the linkbudgetof atelecommunicationsystem.
This term is commonly used in wirelesscommunications and signal propagation. Path loss may be due
to many effects,suchasfree-space loss,refraction,diffraction,reflection,aperture -medium coupling
loss, and absorption.Pathlossis also
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

More Related Content

DOCX
Mca5032 wireless and mobile communication
PDF
wcdma wireless principle
PDF
Handover wcdma gsm
PDF
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
PDF
Ic3514231425
PDF
01principlesofthewcdmasystem 120627071558-phpapp02
PDF
www.ijerd.com
PPTX
Cdma presentation final
Mca5032 wireless and mobile communication
wcdma wireless principle
Handover wcdma gsm
A Dynamic MAC Protocol for WCDMA Wireless Multimedia Networks
Ic3514231425
01principlesofthewcdmasystem 120627071558-phpapp02
www.ijerd.com
Cdma presentation final

What's hot (20)

PPTX
Gsm&cdma
PPTX
Multiple access communication
PPT
Wcdma
PPTX
TDMA Technology
PPT
Cdma
PPT
CDMA 1x Introduction to Power Control Issue2.1
PPT
presentation on samsung
PDF
Cdma introduction pr
DOCX
Improving the quality of gsm servece
PPT
Cdma
PDF
DESIGN OF SECURE AND RELIABLE MU-MIMO TRANSCEIVER SYSTEM FOR VEHICULAR NETWORKS
PPT
Ea 452 chap9
PPTX
CDMA Presentation
PPT
CDMA TECHNOLOGY
PDF
Building SMS Applications with Ruby-SMPP
PPT
Code division multiple access
PPTX
PPT
CDMA- INTRO BASICS
PDF
Code Division Multiple Access
Gsm&cdma
Multiple access communication
Wcdma
TDMA Technology
Cdma
CDMA 1x Introduction to Power Control Issue2.1
presentation on samsung
Cdma introduction pr
Improving the quality of gsm servece
Cdma
DESIGN OF SECURE AND RELIABLE MU-MIMO TRANSCEIVER SYSTEM FOR VEHICULAR NETWORKS
Ea 452 chap9
CDMA Presentation
CDMA TECHNOLOGY
Building SMS Applications with Ruby-SMPP
Code division multiple access
CDMA- INTRO BASICS
Code Division Multiple Access
Ad

Similar to Mca5032 wireless and mobile communication (20)

DOCX
Mca5032 wireless and mobile communication
DOCX
Bt0086, mobile computing
DOCX
Mca3050 advanced computer networks
DOCX
Mca3050 advanced computer networks
DOCX
Mca3020 advanced database management system
DOC
Ac mid1
DOCX
Bt0086, mobile computing
DOCX
Bt0086, mobile computing
DOCX
Mi0035 computer networks
DOC
It6601 mc - qb - part a (2) (1)
DOCX
Bt0086 mobile computing-de
DOCX
Bt0086 mobile computing-de
DOCX
Bt0086 mobile computing-de
PPTX
Cdma Security
PDF
8th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
DOCX
Bc0055, tcp ip protocol suite
PDF
CDMA.pdf
PPTX
INTRODUCTION TO WIRELESS NETWORKING
PDF
Mc7503 -mc-2marks
PDF
Ece interview questions with answers
Mca5032 wireless and mobile communication
Bt0086, mobile computing
Mca3050 advanced computer networks
Mca3050 advanced computer networks
Mca3020 advanced database management system
Ac mid1
Bt0086, mobile computing
Bt0086, mobile computing
Mi0035 computer networks
It6601 mc - qb - part a (2) (1)
Bt0086 mobile computing-de
Bt0086 mobile computing-de
Bt0086 mobile computing-de
Cdma Security
8th Semeste Electronics and Communication Engineering (June-2016) Question Pa...
Bc0055, tcp ip protocol suite
CDMA.pdf
INTRODUCTION TO WIRELESS NETWORKING
Mc7503 -mc-2marks
Ece interview questions with answers
Ad

Recently uploaded (20)

PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
HVAC Specification 2024 according to central public works department
PDF
Empowerment Technology for Senior High School Guide
PPTX
Module on health assessment of CHN. pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
International_Financial_Reporting_Standa.pdf
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Climate and Adaptation MCQs class 7 from chatgpt
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
What’s under the hood: Parsing standardized learning content for AI
Literature_Review_methods_ BRACU_MKT426 course material
Computer Architecture Input Output Memory.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
HVAC Specification 2024 according to central public works department
Empowerment Technology for Senior High School Guide
Module on health assessment of CHN. pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Race Reva University – Shaping Future Leaders in Artificial Intelligence
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
English Textual Question & Ans (12th Class).pdf
Introduction to pro and eukaryotes and differences.pptx
Journal of Dental Science - UDMY (2022).pdf
International_Financial_Reporting_Standa.pdf
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Climate and Adaptation MCQs class 7 from chatgpt

Mca5032 wireless and mobile communication

  • 1. Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 ASSIGNMENT PROGRAM MCA(REVISED FALL 2012) SEMESTER V SUBJECT CODE & NAME MCA5032- WIRELESS AND MOBILE COMMUNICATION CREDIT 4 BK ID MAX.MARKS 60 Note:Answer all questions.Kindlynote that answersfor 10 marks questionsshouldbe approximately of 400 words. Each questionis followedbyevaluationscheme. Q.1 Describe any five GSMPLMN basic services Answer: - A publiclandmobile network(PLMN) isa regulatorytermintelecommunications.A PLMN isa networkthatisestablishedandoperatedbyanadministrationorbyarecognizedoperatingagency (ROA) for the specificpurpose of providinglandmobile telecommunicationsservicestothe public.[1] A PLMN isidentifiedbythe Mobile CountryCode ( Q.2 Describe about WirelessCommunication.Explainitsadvantages. Answer: - Wireless communication is the transfer of information between two or more points that are not connectedbyan electrical conductor.The mostcommonwirelesstechnologiesuse radio.Withradio wavesdistancescan be short, such as a few metersfor televisionoras far as thousandsor evenmillions
  • 2. of kilometers for deep-space radio communications. It encompasses varioustypes of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wirelessnetworking.Otherexamplesof Q.3 Differentiate betweenBSCandMSC protocols Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of interfacesisused.The Abisinterface isusedbetweenthe BTS and BSC. At this level,the radioresources at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management (BTSM).The BTS managementlayerisarelayfunctionatthe BTS to the BSC. The RR protocols are responsible for the allocationand reallocation of traffic channelsbetween the MS and the BTS. These services include controlling the initial access to the system, paging for MT calls, the handover of calls between cell sites, power control, and call termination. The RR protocols provide the proceduresforthe use,allocation,reallocation,andrelease of the GSM channels.The BSCstill has some radio resource management in place for the frequency coordination, frequency allocation, and the managementof the overall networklayerforthe Layer2 Q.4 What isCDMA? Explain the history of CDMA. Answer:- CDMA:- Code divisionmultipleaccess(CDMA) isachannel accessmethod usedbyvariousradio communicationtechnologies.CDMA isanexample of multipleaccess,whichiswhere several transmitters can send information simultaneously over a single communication channel.This allows several users to share a band of frequencies (see bandwidth). To permit thisto be achieved without undue interference between the users, CDMA employs spread-spectrum technology and a special coding scheme (where each transmitterisassignedacode). CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA. CDMA spreadsdata out overthe channel afterthe Q.5 Explainthe following: a) A5 algorithm for encryption b) A8 algorithm for key generation Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate weakeningof the algorithmforcertainexportregions. A5wasdevelopedin1987,whenGSMwasnotyet consideredforuse outsideEurope,and A5wasdevelopedin1989.Thoughbothwere initiallykeptsecret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in 1999 by Marc Bricenofroma GSM telephone.In2000, around 130 millionGSMcustomersreliedonA5toprotect the confidentialityof theirvoice
  • 3. A8 algorithmfor key generation This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile Station) andthe GSM network. A varietyof securityalgorithmsare usedtoprovideauthentication,cipher keygeneration,integrityandradiolinkprivacytousersonmobile networks Q.6 List and explainthe differentpath lossmodels Answer:- Pathlossmodels:- Pathloss(orpathattenuation)isthe reductioninpowerdensity(attenuation ) of an electromagnetic wave as it propagates through space. Path loss is a major component in the analysisanddesignof the linkbudgetof atelecommunicationsystem. This term is commonly used in wirelesscommunications and signal propagation. Path loss may be due to many effects,suchasfree-space loss,refraction,diffraction,reflection,aperture -medium coupling loss, and absorption.Pathlossis also Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601