Information
For more information about our classifieds, please check following links.
About Terms Privacy
Welcome to clickooz.com! Sign In Are you new to our site? Register now
1 photo

Description

       
Mca5032 SMU SPRING 2018 Get fully solved assignment. Buy online from website

www.smuassignment.in
online store
or

plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate

Charges rs 125/subject

if urgent then call us on 08791490301, 08273413412

PROGRAM - Master of Science in Information Technology(MSc IT)Revised Fall 2011

SEMESTER - 4

SUBJECT CODE & NAME – Mca5032- WIRELESS AND MOBILE COMMUNICATION

CREDIT - 4

Q1. Describe wireless communication. Explain its advantages.
Answer:
Wireless communication is among technology’s biggest contributions to mankind. Wireless
communication involves the transmission of information over a distance without help of wires, cables or
any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters
(for example, a

2 Describe any five GSM PLMN basic services.
Answer: 5 GSM PLMN basic services
Dual-Tone multifrequency (DTMF): The automatic answering machines used in wireless
telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a
tone signalling service

Q3. Differentiate BSC and MSC protocols. 10
Ans: BSC protocols: Once the information is communicated from the BTS to the BSC, the Abis
interface is used to
an be routed to the user by the location information contained in the user’s HLR.
Q4. What is CDMA? Explain the history of CDMA. 4+6 = 10
Ans: CDMA : we will be introduced to the concept of CDMA, its channel concept and its operation.
Code Division Multiple Access technology emerged as an alternative to the GSM cellular architecture.
Frequency reuse is an

Q5. Explain the following: a) A5 algorithm for encryption b) A8 algorithm for key generation 10
Ans: A5 Algorithm – An A5 encryption algorithm scrambles the user's voice and data traffic between the
handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and
the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being
transmitted on the Um interface. The Kc (ciphering key) and the
plaintext data are inputted into the A5 algorithm and
Q6. List and explain the different path loss models. 10
Ans: Path Loss Models: Path loss models describe the signal attenuation between a transmit and a
receive antenna as a function of the propagation distance and other parameters. Some models include
many details of the topography profile to estimate the signal reduction, whereas others just consider
carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as
it propagates through space. It is a major component in the analysis and design of the link budget of a

Get fully solved assignment. Buy online from website

www.smuassignment.in
online store
or

plz drop a mail with your sub code
computeroperator4@gmail.com
we will revert you within 2-3 hour or immediate

Charges rs 125/subject

if urgent then call us on 08791490301, 08273413412        

Comments Add new

Add new comment
No comments added yet. Be first to leave comment!

Seller's info

Seller's picture
Private person
Registered on April 5, 2018

Listing location

India, Delhi, New Delhi

Seller's email address

Close
.
- you cannot copy & paste mail, you need to rewrite it
- do not send spam
- ask only questions related to this product
- do not be rude
Hello! Sign in to get more.
Home Search My account My alerts My personal info My listings Mail us
Refine search
Keyword
Category
Location

Region

City

Pictures
Price

Price:

-
Advanced
Clean search