Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER V
SUBJECT CODE & NAME
CREDIT 4
BK ID
MAX.MARKS 60
Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately
of 400 words. Each question is followed by evaluation scheme.
Q.1 Describe about Wireless Communication. Explain its advantages.
Answer: - Wireless communication is the transfer of information between two or more points that are
not connected by an electrical conductor. The most common wireless technologies use radio. With radio
waves distances can be short, such as a few meters for television or as far as thousands or even millions
of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and
portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs),
and wireless networking. Other examples of
Q.2 Describe any five GSM PLMN basic services
Answer: - A public land mobile network (PLMN) is a regulatory term in telecommunications. A PLMN is a
network that is established and operated by an administration or by a recognized operating agency
(ROA) for the specific purpose of providing land mobile telecommunications services to the public.[1]
A PLMN is identified by the Mobile Country Code (
Q.3 Differentiate between BSC and MSC protocols
Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of
interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio resources
at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management
(BTSM). The BTS management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS
and the BTS. These services include controlling the initial access to the system, paging for MT calls, the
handover of calls between cell sites, power control, and call termination. The RR protocols provide the
procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some
radio resource management in place for the frequency coordination, frequency allocation, and the
management of the overall network layer for the Layer 2
Q.4 What is CDMA? Explain the history of CDMA.
Answer: - CDMA:- Code division multiple access (CDMA) is a channel access method used by various
radio communication technologies.CDMA is an example of multiple access , which is where several
transmitters can send information simultaneously over a single communication channel. This allows
several users to share a band of frequencies (see bandwidth). To permit this to be achieved without
undue interference between the users, CDMA employs spread-spectrum technology and a special
coding scheme (where each transmitter is assigned a code).
CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA.
CDMA spreads data out over the channel after the
Q.5 Explain the following:
a) A5 algorithm for encryption
b) A8 algorithm for key generation
Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate
weakening of the algorithm for certain export regions. A5 was developed in 1987, when GSM was not
yet considered for use outside Europe, and A5 was developed in 1989. Though both were initially kept
secret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in
1999 by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers relied on A5
to protect the confidentiality of their voice
A8 algorithm for key generation
This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to
generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile
Station ) and the GSM network. A variety of security algorithms are used to provide authentication,
cipher key generation, integrity and radio link privacy to users on mobile networks
Q.6 List and explain the different path loss models
Answer:- Path loss models:- Path loss (or path attenuation) is the reduction in power density
(attenuation ) of an electromagnetic wave as it propagates through space. Path loss is a major
component in the analysis and design of the link budget of a telecommunication system.
This term is commonly used in wireless communications and signal propagation . Path loss may be due
to many effects, such as free-space loss , refraction , diffraction , reflection , aperture -medium coupling
loss , and absorption . Path loss is also
Dear students get fully solved SMU MBA Spring 2014 assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601

More Related Content

DOCX
Mca5032 wireless and mobile communication
DOCX
Bt0086, mobile computing
DOCX
Mca5032 wireless and mobile communication
DOCX
Bt0086, mobile computing
PDF
MC_CDMA
PPT
Vip bsnl.ppt1
DOCX
Bt0086 mobile computing-de
PDF
A systematic evaluation of link budget for
Mca5032 wireless and mobile communication
Bt0086, mobile computing
Mca5032 wireless and mobile communication
Bt0086, mobile computing
MC_CDMA
Vip bsnl.ppt1
Bt0086 mobile computing-de
A systematic evaluation of link budget for

What's hot (18)

PPT
Cellular mobile communication
PPTX
Mobile communication process or cellular network
PDF
Mobile Data Networks
DOCX
G second generation network
PDF
Handover wcdma gsm
PDF
Mobile communication lectures
PDF
The impact of intermodulation interference in superimposed 2 g and 3g
PPTX
Comparison between gsm & cdma najmul hoque munshi
PPTX
CDMA cellular radio network
PPT
Mobile communication fundamental
PDF
Cellular Communication Report
PDF
Fookune ndss gsm (1)
PPT
Cellular network presentation
PPT
cellular wirelessnetworks
PPTX
Cellular Networks Presentation in distributed systems, Mobile Networks
PDF
Unit 1-Introduction to Mobile Computing
PPT
Cellular Communication
Cellular mobile communication
Mobile communication process or cellular network
Mobile Data Networks
G second generation network
Handover wcdma gsm
Mobile communication lectures
The impact of intermodulation interference in superimposed 2 g and 3g
Comparison between gsm & cdma najmul hoque munshi
CDMA cellular radio network
Mobile communication fundamental
Cellular Communication Report
Fookune ndss gsm (1)
Cellular network presentation
cellular wirelessnetworks
Cellular Networks Presentation in distributed systems, Mobile Networks
Unit 1-Introduction to Mobile Computing
Cellular Communication
Ad

Similar to Mca5032 wireless and mobile communication (20)

PDF
GSM Technology and security impact
PDF
Ece interview questions with answers
PDF
Unit 4 -Wireless communication & mobile programming
PPTX
Gsm security and encryption
PPTX
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
DOCX
Bt0086 mobile computing-de
DOCX
Bt0086 mobile computing-de
PPTX
GSM CDMA and GPRS
PPT
PDF
Mobile network structure
PDF
Mc7503 -mc-2marks
PPTX
Presentation1 lucky 2 g
PDF
Electronics lovers presents interview questions part 1
PPTX
E5-E6-EM-3-Overview of Mobile Communication-I.pptx
PDF
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
PPTX
44Con 2014: GreedyBTS - Hacking Adventures in GSM
PDF
Wireless and mobile communicationnnn.pdf
PDF
CDMA.pdf
PPT
Mobile Computing_PPT.ppt
GSM Technology and security impact
Ece interview questions with answers
Unit 4 -Wireless communication & mobile programming
Gsm security and encryption
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
Bt0086 mobile computing-de
Bt0086 mobile computing-de
GSM CDMA and GPRS
Mobile network structure
Mc7503 -mc-2marks
Presentation1 lucky 2 g
Electronics lovers presents interview questions part 1
E5-E6-EM-3-Overview of Mobile Communication-I.pptx
44CON 2014 - GreedyBTS: Hacking Adventures in GSM, Hacker Fantastic
44Con 2014: GreedyBTS - Hacking Adventures in GSM
Wireless and mobile communicationnnn.pdf
CDMA.pdf
Mobile Computing_PPT.ppt
Ad

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Architecture types and enterprise applications.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Configure Apache Mutual Authentication
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
The various Industrial Revolutions .pptx
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Five Habits of High-Impact Board Members
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
A comparative study of natural language inference in Swahili using monolingua...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Architecture types and enterprise applications.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
Abstractive summarization using multilingual text-to-text transfer transforme...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Module 1.ppt Iot fundamentals and Architecture
Enhancing emotion recognition model for a student engagement use case through...
Zenith AI: Advanced Artificial Intelligence
Final SEM Unit 1 for mit wpu at pune .pptx
Configure Apache Mutual Authentication
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
The various Industrial Revolutions .pptx
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Five Habits of High-Impact Board Members
A proposed approach for plagiarism detection in Myanmar Unicode text
A comparative study of natural language inference in Swahili using monolingua...

Mca5032 wireless and mobile communication

  • 1. Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601 ASSIGNMENT PROGRAM MCA(REVISED FALL 2012) SEMESTER V SUBJECT CODE & NAME CREDIT 4 BK ID MAX.MARKS 60 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Q.1 Describe about Wireless Communication. Explain its advantages. Answer: - Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of Q.2 Describe any five GSM PLMN basic services Answer: - A public land mobile network (PLMN) is a regulatory term in telecommunications. A PLMN is a network that is established and operated by an administration or by a recognized operating agency (ROA) for the specific purpose of providing land mobile telecommunications services to the public.[1] A PLMN is identified by the Mobile Country Code (
  • 2. Q.3 Differentiate between BSC and MSC protocols Answer: - BSC Protocols: After the information is passed from the BTS to the BSC, a different set of interfaces is used. The Abis interface is used between the BTS and BSC. At this level, the radio resources at the lower portion of Layer 3 are changed from the RR to the Base Transceiver Station Management (BTSM). The BTS management layer is a relay function at the BTS to the BSC. The RR protocols are responsible for the allocation and reallocation of traffic channels between the MS and the BTS. These services include controlling the initial access to the system, paging for MT calls, the handover of calls between cell sites, power control, and call termination. The RR protocols provide the procedures for the use, allocation, reallocation, and release of the GSM channels. The BSC still has some radio resource management in place for the frequency coordination, frequency allocation, and the management of the overall network layer for the Layer 2 Q.4 What is CDMA? Explain the history of CDMA. Answer: - CDMA:- Code division multiple access (CDMA) is a channel access method used by various radio communication technologies.CDMA is an example of multiple access , which is where several transmitters can send information simultaneously over a single communication channel. This allows several users to share a band of frequencies (see bandwidth). To permit this to be achieved without undue interference between the users, CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code). CDMA (Code Division Multiple Access) CDMA takes an entirely different approach from GSM/TDMA. CDMA spreads data out over the channel after the Q.5 Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation Answer: - A5 algorithm for encryption:-A5 is used in Europe and the United States. A5was a deliberate weakening of the algorithm for certain export regions. A5 was developed in 1987, when GSM was not yet considered for use outside Europe, and A5 was developed in 1989. Though both were initially kept secret, the general design was leaked in 1994 and the algorithms were entirely reverse engineered in 1999 by Marc Briceno from a GSM telephone. In 2000, around 130 million GSM customers relied on A5 to protect the confidentiality of their voice A8 algorithm for key generation
  • 3. This algorithm is used in conjunction with Ki the authentication key and RAND (Random Number) to generate Kc (Cipher Key ). This is used with A5/X to cipher the data stream between the MS (Mobile Station ) and the GSM network. A variety of security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks Q.6 List and explain the different path loss models Answer:- Path loss models:- Path loss (or path attenuation) is the reduction in power density (attenuation ) of an electromagnetic wave as it propagates through space. Path loss is a major component in the analysis and design of the link budget of a telecommunication system. This term is commonly used in wireless communications and signal propagation . Path loss may be due to many effects, such as free-space loss , refraction , diffraction , reflection , aperture -medium coupling loss , and absorption . Path loss is also Dear students get fully solved SMU MBA Spring 2014 assignments Send your semester & Specialization name to our mail id : “ help.mbaassignments@gmail.com ” or Call us at : 08263069601