Zeal Polytechnic, Pune.: Third Year (Ty) Diploma in E&Tc Engineering Scheme: I Semester: V
Zeal Polytechnic, Pune.: Third Year (Ty) Diploma in E&Tc Engineering Scheme: I Semester: V
Zeal Polytechnic, Pune.: Third Year (Ty) Diploma in E&Tc Engineering Scheme: I Semester: V
Page 1 of 10
Scheme – I
Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.
Fig 1.
Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.
Instructions:
(1) All questions are compulsory.
(2) Illustrate your answers with neat sketches wherever necessary.
(3) Figures to the right indicate full marks.
(4) Assume suitable data if necessary.
(5) Preferably, write the answers in sequential order.
Marks
P.T.O.
22533 [2]
Marks
d) Identify the block diagram and state the functions of blocks A,
B and C in Figure No. 1.
Fig. No. 1
Fig. No. 2
b) State the features of UMTS and give UMTS air interface
specification.
c) Give the classification of RFID tags and give the applications
of RFID.
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
WINTER – 19EXAMINATION
Subject Name: Mobile And Wireless Communication Model Answer Subject Code: 22533
Important Instructions to examiners:
1) The answers should be examined by key words and not as word-to-word as given in themodel answer
scheme.
2) The model answer and the answer written by candidate may vary but the examiner may tryto assess the
understanding level of the candidate.
3) The language errors such as grammatical, spelling errors should not be given moreImportance (Not
applicable for subject English and Communication Skills.
4) While assessing figures, examiner may give credit for principal components indicated in thefigure. The
figures drawn by candidate and model answer may vary. The examiner may give credit for anyequivalent
figure drawn.
5) Credits may be given step wise for numerical problems. In some cases, the assumed constantvalues may
vary and there may be some difference in the candidate’s answers and model answer.
6) In case of some questions credit may be given by judgement on part of examiner of relevant answer based
on candidate’s understanding.
7) For programming language papers, credit may be given to any other program based on equivalent concept.
Q 10-Total
Attempt any FIVE of the following:
.1 Marks
Page 1 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
b) Define forward control channel and reverse control channel. 2M
Cell splitting:-
Ans Cell splitting is the process of subdividing a congested cell into smaller cells, each with its
: own base station and corresponding reduction in antenna height and transmitter power.
Cell splitting increases the capacity of a system since it increases number of times that
channels are reused.
d) List two features of 4G LTE. 2M
Common spectrum for IMT 2000 world-wide is from 1.8 GHz-2.2 GHz band
Ans or
: 2M
For Uplink: 1885-2025 MHz (Mobile satellite services)
Downlink: 2110-2200 MHz (Mobile satellite services)
f) State any two features of bluetooth technology. 2M
Page 4 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
2 Bandwidth of each channel 1.25MHz 200KHz
9
Frequency spectrum 800 or 1900 MHz 890-915 MHz 935-
960MHz
d) Identify the block diagram and state the functions of blocks A, B and C in Figure No.1 4M
Identificati
on 1M
Function
of A,B,C-
1M each
Page 5 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Q 12-Total
Attempt any THREE of the following:
.3 Marks
The problem associated with the sectoring is the number of handoffs. This puts
Ans additional load on the switching and control link elements of the mobile system. A
: solution to this problem is based on microcell concept for seven cellreuse.
In this scheme, all the three or more zone sites represented as Tx/Rx are connected to
the same base station and share the same radio equipment. The transmission media used
for connecting the zones to the base station are coaxial cable, fiber optics cable or a
microwavelink.
So each cell consists of a base station and multiple zones. A mobile travelling within a
cell, is served by the zone that has the strongest signal ofall.
As shown in figure, the antennas in zones are placed at the outer edge of the cell and
any base station channel can be assigned to any zone by the base station. As a mobile
travels from one zone to the other within a cell, it uses the samechannel.
This will avoid handoff. The base station will just switch the channel to the appropriate
zone site. Thus a given channel is being used only in a particular zone in which the
mobile istravelling.
So the base station radiation is localised.this will reduce interference. The channels are
distributed in space and time by all zones and are reused in the co channel cells. The microcell
zone concept is very useful along highways or in the busy areas.
Page 6 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
4. Frequency band flexibility.
5. Migration paths.
It provides high data rate internet access capabilities in gradual manner within the existing
systems.
Mobile ad hoc networks (MANETs) are envisioned to become key components in the
4G architecture, and ad hoc networking capabilities are expected to become an
important part of overall next-generation wireless network functionalities.
Such a network may operate in a standalone fashion, or may be connected to the larger
Internet.
Mobile ad hoc networks are infrastructure less networks since they do not require any
fixed infrastructure such as a base station for their operation.
Routes between nodes in an ad hoc network may include multiple hops and, hence, it is
appropriate to call such networks ―multihop wireless ad hoc networks.”
Page 7 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Dig-2M,
Ans
: Explanatio
n -2M
Bluetooth is both a hardware-based radio system and a software stack that specifies the linkages
between the architecture layers of the two.
Page 8 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
The heart of this specification is the protocol stack, which is used to define how Bluetooth
works. The Bluetooth protocol stack is a set of layered programs.
Each layer in a protocol stack talks to the layer above it and to the layer below it.
Think of Bluetooth as having two well-defined layers of functionality in the stack. These layers
range from the lower level hardware-based radio system, to an upper level software stack that
specifies the linkages between the layers .
The lower layers are the basic core specifications that describe how Bluetooth works. The base
of the Bluetooth protocol stack is the radio layer, or module. The radio layer describes the
physical characteristics of the transceiver. It is responsible for modulation/demodulation of data
for transmitting or receiving over radio frequencies in the 2.4 GHz band. This is the physical
wireless connection. It splits the transmission band into 79 channels and performs fast frequency
hopping (1600 hops/sec) for security.
Upper Stack Layers
The upper stack layers consist of profile specifications that focus on how to build devices that
will communicate with each other, using the core technology.
The host controller interface (HCI) serves as the interface between the software part of the
system and the hardware (i.e., the device driver).
The L2CAP (logical link control and adaptation protocol) layer is above the HCI in the upper
stack. Among other functions, it plays a central role in communication between the upper and
lower layers of the Bluetooth stack. It keeps track of where data packets come from and where
they should go. It is a required part of every Bluetooth system.
Above the L2CAP layer, the protocol stack is not as linearly ordered. Still, the service
discovery protocol (SDP) is important to mention because it exists independently of other
higher-level protocol layers. It provides the interface to the link controller and allows for
interoperability between Bluetooth devices.
any 1
Ans
service-1M
: Signalling system SS7 and explain services and performance.
Performan
ce-1M
Page 9 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Or
SS7 Services:
Touch star:
This kind of service is also known as CLASS and is a group of switch- controlled services that
provide its users with certain call management capabilities.
Services such as call return, call forwarding, repeat dialing, call block, call tracing and
caller ID are provided
or
800Services:
These services were introduced by Bell Systems to provide toll-free access to the calling party
and to the services and database which is offered by the private parties.
The costs associated with the processing of the calls are paid by the service subscriber.
The service is offered in two plans known as the 800-NXX plan and the 800 database plan.
In the 800-NXX plan the first six digits of an 800 call are used to select the interexchange
Page 10 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
carrier(IXC).
In the 800 database plan, the call is looked up in a database to determine the appropriate
carrier and routing information.
Alternate Billing Service and Line Information Database(ADB/LIDB):
These services use the common channel signaling (CCS) network to enable the calling
party to bill a call to a personal number (third party number, calling card or collect, etc.)
from any number.
Performance of SS7
1) Performance of signaling network is studied by connection set-up time (response
time) or the end-to-end Signaling information transfer time. The delays in the
signaling point (SP) and the STP depend on the specific hardware configuration &
switching software
2) Congestion control In SS7networks:
o With the increase in subscribers it is important to avoid congestion in the
signaling network under heavy traffic conditions.SS7 networking protocols provide
several congestion control schemes, allowing traffic to avoid failed links & nodes.
Features
Page 11 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Dig-
Ans
2M,expla-
:
2M
Explanation
Authentication refers to process by which station confirms the identity of mobile
station. It protects GSM network against unauthorized access.
Page 12 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Page 13 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
GSM
architectur
e :2M
Explanatio
n of any
two
control
channel
:2M
Page 14 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
to send slow but regularly changing control information to the mobile such a transmit
power level instruction. On the reverse link the SACCH carries information about the
received signal strength.
Fast Associated Control Channel (FACCH):FACCH carries urgent messagesand contains
essentially the same type of information asSDCCH.
Ans 3M Explan
LMDS is one of the new proposed services and applications. It is in the early stages of
commercialization.
In 1998, 1200MHz of the unused spectrum in the 27-31GHz band was auctioned by the US
government to support LMDS.
Similar auctioned were held worldwide. Various spectrums were allotted for the LMDS.
Most of these allocations share the frequencies with the teledesic band approved by the ITU for
broadband satellite systems.
The teledesic band was originally established for the Motorola iridium system.
LMDS is a fixed wireless system. The table given shows the total spectrum bandwidth of various
wireless systems in the US. It shows that the BW of 1300MHz has been allotted for LMDS.
The 1300MHz bandwidth of LMDS is sufficient to provide more than 200TV channels or 65000
full duplex voice channels.
The US LMDS band is 27.5 - 28.35 GHz, 29.1 – 29.25 GHz and 31.075 – 31.225 GHz.
However LMDS has its own drawbacks. LMDS is a brand new, and an unproven system. The
equipment required for LMDS are millimeter wave equipment which are costly.
The most important application of LMDS is the Local Exchange Carrier (LEC) network. It is
shown in the figure.
In this network the LEC uses a very wide bandwidth ATM (asynchronous transfer mode) or
SONET (synchronous optical network) backbone switch.
Such a switch can connect hundreds of megabits per second traffic to the internet, PSTN, or to its
own private network.
The LMDS thus provides wireless broadband connectivity to the customers without using the
cables.
Difficulties:
The most important problem for LMDS of WLL is that of line of sight (LOS). If the antennas can
be seen, then only the transmission is successful.
The other problem is that rain, snow and hail can create large changes in the channel gain
3M
between the transmitter and receiver.
Diagram
Diagram:
Page 15 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
3M
Explanatio
n
OR
LMDS: Local multi-point distribution system.
It is a broadband wireless point to multipoint communication system that provides reliable digital
two-way voice, data and Internet services. The term "Local" indicates that the signals range limit.
"Multipoint" indicates a broadcast signal from the subscribers, the term "distribution" defines the
wide range of data that can be transmitted, data ranging anywhere from voice, or video to Internet
and video traffic.
It provides high capacity point to multipoint data access that is less investment intensive.
Advantages:
Lower entry and deployment cost.
Ease and speed of deployment.
Fast realization of revenue.
Uses low powered high frequency (25-31 GHz) signals over a short distance. 3M
Four parts in LMDS are:
1. NOC (network operation center). Diagram
2. Fiber based infrastructure.
3. Base station.
4. Customer premise equipment.
Diagram:
Page 16 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
or
(b) Explain frequency reuse concept. Draw the frequency reuse pattern for cluster size 7. 6M
Ans 4M for
: i. The design process of selecting and allocating channel groups for all cellular base explanatio
stations within a system is called as frequency reuse or frequency planning. n of
ii. Cellular radio systems rely on an intelligent allocation and reuse of channels throughout a frequency
coverage region. Each cellular base station is allocated a group of radio channels to be used with reuse
small geographic area called a cell. Base stations in adjacent cells are assigned channel group
which contains completely different channels than neighbouring cells. concept
iii. By limiting the coverage area to boundaries of a cell, same group of channels may be used to
cover different cells that are separated from each other by distances large enough to keep
interference levels within tolerance limits.
Page 17 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
iv. If each cell is allotted K sets of channels and if S channels are divided among N cells in
unique and disjoint groups which have same number of channels, then total number of available
channels can be S=KN.
If cluster is replicated M times then capacity C=MKN=MS.
v. Frequency reuse factor =1/Cluster size (N)
vi. The cells which have been allotted same group of channels are called co-channels.
The co-channel reuse factor Q is defined as Q=D/R
Where, D=Minimum safe distance after which group of frequencies can be repeated
R=Cell radius
Thus a small value of Q means larger capacity as cluster size N is small whereas large value of Q
improves transmission quality. To improve capacity N is usually 4, 7 or 12.
vii. To improve capacity and efficiency of frequency reuse plan, cell sectoring is employed with
Omnidirectional antenna.
Diagram:
2 M for
Diagram
of
frequency
reuse
pattern for
cluster size
7
(c) Explain step by step procedure of landline originated call with neat timing diagram. 6M
Ans When a cellular phone is turned ON, but not yet engaged in a call, it first scans the group of
: forward control channels to determine the one with the strongest signal, and then monitors that
control channel until the signal level drops below a usable level.
Call initiation by a landline (PSTN) subscriber to mobile user:
The mobile switching centre (MSC) dispatches the request to all base station in a cellular system.
The Mobile Identification Number (MIN) which is subscriber telephone number is then broadcast
as a paging message over all of the forward control channels throughout the cellular system.
The mobile receives the paging message sent by BS which s monitors, and responds by 3M for
identifying itself over the RCC.
The BS relays the acknowledgement sent by the mobile and informs the MSC of handshake.
Page 18 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
The MSC instructs the BS to move the call to an unused voice channel pair within the cell. explanation
The BS signals the mobile to change frequencies to an unused forward and reverse voice channel
pair.
Another data message is transmitted on forward channel to instruct the mobile telephone to ring
and
mobile user to answer the phone.
Figure below shows sequence of events involved in call connection.
Diagram:
3M for
timing
diagram
OR
Page 19 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
Q 12 Total
Attempt any TWO of the following:
.6 Marks
Identify the block diagram and explain the blocks A and B in Figure No. 2.
(a) 6M
1 M for
explan of
logic unit
(b) State the features of UMTS and give UMTS air interface specification. 6M
Page 21 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
4
Duplexing technique FDD and TDD modes
5
Modulation scheme Direct sequence CDMA and QPSK
6
Frame length 10 ms frame with 15 time slots
7
Coding technique Orthogonal Variable Spreading
8 Factor (OVSF)
Service type Multi-rate and multi-service
(c) Give the classification of RFID tags and give the application of RFID. 6M
Applications of RFID:
i. Automotive:
Auto makers have added security and convenience to automobiles by using RFID 4M for
technology for anti-theft immobilizers and passive entry systems. Applicatio
Some auto manufacturers use RFID systems to move cars through an assembly line. At ns of RFID
each successive stage of production, the RFID tag tells the computers what the next step
of the automated assembly is.
ii. Animal tracking:
Ranchers and livestock producers use RFID technology to meet export regulations and
optimize livestock value.
Wild animals are tracked in ecological studies, and many pets who are tagged are returned
to their owners.
Thus a tag can carry information as simple as a pet owner’s name and address.
iii. Assets tracking:
Hospitals and pharmacies meet tough product accountability legislation with RFID;
libraries limit theft and keep books in circulation more efficiently.
iv. Contactless commerce:
Blue-chip companies such as American Express, Exxon Mobile, and MasterCard use
innovative form factors enabled by RFID technology to strengthen brand loyalty and
Page 22 / 23
MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
(Autonomous)
(ISO/IEC - 27001 - 2013 Certified)
__________________________________________________________________________________________________
boost revenue per customer.
v. Supply chain:
Wal-Mart, Target, Best Buy, and other retailers have discovered that RFID technology
can keep inventories at the optimal level, reduce out of stock losses, limit shoplifting, and
speed customers through check-out lines.
vi. Replacement for bar codes:
RFID can serve a lot of advantages by replacing bar codes.
One of the key differences between RFID and bar code technology is RFID eliminates the
need of line-of-sight reading that bar coding depends on.
Also, RFID scanning can be done at greater distances than bar code scanning. High
frequency RFID systems (850–950 MHz, 2.4–2.5 GHz) offer transmission ranges more
than 90 feet.
Barcodes are fixed at the time of printing and can be rendered useless by defacement or
smudging.
Bar codes can be spoofed or easily defeated by any malicious individual having a laser
printer at their disposal.
Note: marks to be credited if classification is given on frequency bases.
Page 23 / 23