CS1602 - MODEL 1 Unit-1: Part A
CS1602 - MODEL 1 Unit-1: Part A
UNIT-1 : PART A
13. Spread spectrum is inherently secured than simple shift keying techniques. Justify this statement.
14. Why “MAC protocol designed for infrastructure based wireless network may not work satisfactory in
infrastructure less environment”– Justify
15. Analyze the following scenarios in which mobile communication is involved and mobile communication is
not involved.
i) A person from a cell phone accesses a stationary server in his office that is in a wired
network.
ii) A person from one PC transfers a file to another person who is also working in a PC using
wired connection.
iii) A call is made from a land line phone to a mobile phone.
iv) Communication takes place between a pocket PC and a PDA.
UNIT-1 : PART B
1. What is mobile computing? Mention the characteristics and applications of mobile computing.
4. What is TDMA, SDMA? Briefly explain its working and its important applications.
7. Assume that two senders A and B want to send the data. CDMA assigns 010011 as the key to A and
110101 as the key to B. A want to send 1 and B wants to send 0. CDMA codes 0 as – 1 and 1 as + 1.
Explain the steps involved in the process of sending and receiving.
8. Explain hidden and exposed terminal problem and near and far terminal problem with an example.
10. Assume that two senders A and B want to send the data. CDMA assigns 010011 as the key to A and
110101 as the key to B. A want to send 1 and B wants to send 0. CDMA codes 0 as – 1 and 1 as + 1.
Explain the steps involved in the process of sending and receiving. Explain the following
(i) Random Assignment Scheme
UNIT-2 PART: A
1. What is the frequency range of uplink, downlink in GSM network?
2. What are the different services offered by GSM?
UNIT-2 : PART B
2. Explain the Localization, calling and handover in GSM. Also discuss the timeline diagram of the Intra MSC
handover.
5. Explain the various components of radio subsystem and Network Subsystem of GSM networks.
6. Explain GSM Authentication and security and how security is implemented in GSM?
7. Draw and explain the GPRS and its protocol architecture.
PART- C
1. Apply mobile computing to design Taxi dispatcher and monitoring service. Explain the components in
detail. (UNIT-1)
2. Assume that three stations A, B and C are deployed as follows. B is within the transmission range of A and
C and A and C are not within the transmission range. Explain how collisions are avoided using MACA
protocol. (UNIT-1)
3. Assume that you are going to design and implement a cellular network for Uthiramerur Taluk which is full
of small villages except few small towns. Discuss the ways in which you’ll decide the various frequency is
distributed into different channel with its radio interference. Draw a rough diagram that conveys your
design. You have to implement a cellular network for T. Nagar in Chennai. Repeat all the activities what
you had done for Uthiramerur network for T.Nagar network also. (UNIT-2)