SOLVED Wireless Communication CSI-410 Past Paper Spring 2023
SOLVED Wireless Communication CSI-410 Past Paper Spring 2023
● Definition: Analog signals are continuous and can take any value over time. They change
smoothly and can represent real-world information like sound, light, or temperature.
● Characteristics:
○ Continuous: Analog signals are smooth and flow without breaks.
○ Infinite Values: They can take any possible value within a certain range.
○ Changes Over Time: The signal continuously varies based on the information being
sent.
● Example:
○ FM radio signals are analog. The signal changes smoothly to represent the sound
waves we hear on the radio.
● Usage in Wireless Communication:
○ Analog signals are used in older technologies such as AM/FM radio, analog TV, and
traditional landline phones.
Digital Signals:
● Definition: Digital signals are made up of discrete, fixed values, usually represented as binary
(0s and 1s). They are not continuous like analog signals.
● Characteristics:
○ Discrete Values: Digital signals can only have specific values (0 or 1).
○ Pulse-Like: They are represented by a series of pulses, each indicating a binary
value.
○ Non-Continuous: They switch sharply between different states (high or low).
● Example:
○ Wi-Fi signals that carry data for the internet use digital signals, transmitting
information in the form of 0s and 1s.
● Usage in Wireless Communication:
○ Digital signals are used in most modern systems like mobile networks (4G, 5G),
Bluetooth, and satellite communication because they are faster and more reliable.
Value Range Can have any value Can only take specific values (e.g., 0 and 1)
Noise Sensitivity More affected by noise and Less affected by noise, more reliable
distortion
Data Capacity Lower data capacity Higher data capacity, suitable for fast data
Error Detection Difficult to detect and fix Easier to detect and fix errors
errors
2. Signal Impairment:
When signals are sent through the air, they face several problems, known as signal impairments.
These impairments affect the quality and strength of the signal, making communication less effective.
The three main types of signal impairment are attenuation, noise, and interference.
a. Attenuation:
● Definition: Attenuation is the weakening of the signal strength as it travels through the air or
across long distances.
● Cause:
○ As the signal moves farther from its source or passes through obstacles (like walls or
buildings), it loses strength.
● Effect on Wireless Communication:
○ The signal may become too weak for the receiver to detect, leading to poor reception
or even a loss of connection.
● Example:
○ When you move far away from a Wi-Fi router, the internet connection slows down or
drops due to attenuation.
b. Noise:
● Definition: Noise is unwanted electrical signals or interference that mix with the original
signal and cause distortion.
● Cause:
○ Noise can come from many sources, such as other electrical devices, power lines, or
natural events (e.g., lightning).
● Effect on Wireless Communication:
○ Noise makes it harder for the receiver to correctly understand the signal, reducing the
quality of communication.
● Example:
○ Static or hissing sounds on a radio station when you drive through a tunnel are caused
by noise interfering with the radio signal.
c. Interference:
● Definition: Interference happens when two or more signals overlap and disturb each other,
leading to confusion or loss of data.
● Cause:
○ Interference usually occurs when multiple devices are using the same frequency or
nearby frequencies. This overlap causes the signals to mix and disrupt
communication.
● Effect on Wireless Communication:
○ Interference can cause slow data speeds, dropped connections, or complete signal
loss.
● Example:
○ If two Wi-Fi networks in the same area use the same frequency, they may interfere
with each other, making both networks slower.
● Multipath Fading:
○ This occurs when the signal takes multiple paths to reach the receiver due to
reflections from buildings or other objects. The different paths can interfere with each
other, causing signal loss.
● Doppler Shift:
○ When the source or receiver is moving (such as a car using mobile data), the
frequency of the signal can change due to the Doppler effect, which can distort the
signal.
Question #3: (a)What is the I33 B03.11 standard commonly known as? Briefly
explain its purpose and some of its variants.
1. I33 B03.11 Standard:
The I33 B03.11 standard is commonly known as the IEEE 802.11 standard. This standard is a set of
specifications that define how wireless local area networks (WLANs) operate. It is most widely
recognized as the basis for Wi-Fi technology, which allows wireless devices to communicate with
each other over short distances without the need for cables.
The main purpose of the IEEE 802.11 standard is to ensure that different wireless devices, such as
laptops, smartphones, routers, and access points, can communicate with each other reliably and
efficiently within a WLAN. This standard defines how data is transmitted over radio waves, how
devices connect to networks, and how they handle issues like interference or security.
Over time, several versions (or variants) of the IEEE 802.11 standard have been developed to improve
performance, increase data speeds, and expand coverage. Some of the major variants include:
● IEEE 802.11a:
○ Introduced in 1999, this variant operates in the 5 GHz frequency band and supports
data rates up to 54 Mbps.
○ It offers less interference but has a shorter range compared to later versions.
● IEEE 802.11b:
○ Also introduced in 1999, it operates in the 2.4 GHz frequency band and supports
data rates up to 11 Mbps.
○ It has a longer range than 802.11a but is more prone to interference from other
devices like microwaves or cordless phones.
● IEEE 802.11g:
○ Released in 2003, it operates in the 2.4 GHz band and supports data rates up to 54
Mbps, combining the higher speed of 802.11a with the longer range of 802.11b.
● IEEE 802.11n (Wi-Fi 4):
○ Introduced in 2009, it operates in both the 2.4 GHz and 5 GHz bands and supports
data rates up to 600 Mbps. It uses multiple antennas (MIMO) to increase speed and
range.
● IEEE 802.11ac (Wi-Fi 5):
○ Released in 2013, this variant works in the 5 GHz band and can achieve data rates up
to 1.3 Gbps. It supports more antennas and higher channel bandwidths, making it
faster and more efficient for streaming and large file transfers.
● IEEE 802.11ax (Wi-Fi 6):
○ The latest version, introduced in 2019, operates in both 2.4 GHz and 5 GHz bands
and supports speeds up to 9.6 Gbps. It focuses on improving network performance in
crowded areas with many devices (like stadiums or offices) by reducing congestion.
Question #3: (b) Why is it important to secure wireless networks? Mention some
common security risks associated with open Wi-Fi networks.
1. Importance of Securing Wireless Networks:
Securing wireless networks is essential to protect the data and privacy of users. Since wireless
networks transmit data over the air, they are more vulnerable to eavesdropping and unauthorized
access compared to wired networks. Without proper security, attackers can easily intercept data, steal
personal information, or misuse the network. Securing a wireless network ensures that only authorized
users can access the network, and it protects sensitive information from being exposed to potential
threats.
● Prevent unauthorized access: Ensures that only trusted users can connect to the network.
● Protect sensitive data: Safeguards personal or business information, such as passwords,
financial details, and private communications.
● Avoid malicious attacks: Protects the network from hackers who may try to exploit
vulnerabilities, infect devices with malware, or launch denial-of-service (DoS) attacks.
● Maintain network performance: Prevents unauthorized users from slowing down the
network by using up bandwidth.
2. Common Security Risks Associated with Open Wi-Fi Networks:
An open Wi-Fi network is one that does not require a password to join, making it easy for anyone to
connect. While convenient, open Wi-Fi networks pose several security risks:
Random Access Control Protocols are used in communication networks to manage how multiple
devices (or users) share a common communication channel. These protocols allow devices to transmit
data whenever they need to, but they also include methods to handle situations where multiple devices
try to send data at the same time (collisions). The protocols operate in a way that each device accesses
the communication medium (like a Wi-Fi channel or Ethernet) randomly, without being assigned a
specific time slot or order.
CSMA stands for Carrier Sense Multiple Access, which is a type of protocol where a device checks
(or "senses") the channel before trying to send data. If the channel is busy, the device waits until it
becomes free to avoid collisions. Both CSMA/CD and CSMA/CA are variations of this basic
protocol, with different methods to handle collisions.
Collision Detects collisions after they occur Avoids collisions before they occur
Handling
Transmission Devices transmit immediately after Devices wait for a random backoff
Process sensing a free channel period before sending data
Suitability Works well in wired networks with Necessary for wireless networks where
low collision risks collision detection is difficult
Question #5: Discuss the features and services of GSM? Also draw and describe
three important blocks of GSM(2G) Architecture.
1. Features of GSM (Global System for Mobile Communication):
GSM is a 2nd Generation (2G) mobile communication standard that was developed to improve voice
communication and support basic data services. It became the most widely used mobile
communication standard worldwide due to its many features.
● Digital Technology: GSM uses digital communication, offering better voice quality and more
efficient use of the frequency spectrum compared to analog systems.
● SIM Card: GSM introduced the use of Subscriber Identity Module (SIM) cards, which
store user information and allow users to switch between phones by swapping SIM cards.
● International Roaming: GSM provides global roaming capabilities, allowing users to use
their mobile phones in different countries where GSM networks are available.
● Efficient Spectrum Use: GSM operates on multiple frequency bands such as 900 MHz, 1800
MHz, and 1900 MHz, efficiently managing the use of the frequency spectrum.
● Encryption: To enhance security, GSM uses encryption methods to protect calls and data
from unauthorized access.
● SMS and MMS: GSM introduced Short Message Service (SMS) for text messaging and
Multimedia Messaging Service (MMS) for sending multimedia content like images and
videos.
● Support for Data Services: Although initially focused on voice communication, GSM
supports basic data services through General Packet Radio Service (GPRS) and Enhanced
Data rates for GSM Evolution (EDGE).
● Call Forwarding and Call Waiting: GSM provides several call management features such as
call forwarding, call waiting, call barring, and caller ID.
2. Services of GSM:
The GSM architecture is designed to support wireless communication across wide areas. It consists of
several blocks or subsystems that work together to provide seamless service to users. Here are the
three most important blocks:
+---------------------------------------+
| +-------------------------------------------+ |
+----+-------------------------------------------+----+
|
|
+------v--------+
| +----------------------------+ |
| | BSC + BTS | |
+--+----------------------------+---+
+------v--------+
+----------------------------+
Past paper solved by Muhammad Abdullah Ahsan. For educational support only. Sharing this solution
on social media for student assistance falls under 'fair use' for non-commercial educational purposes.
Unauthorized sale or misuse is prohibited under Section 2 of the Copyright Ordinance, 1962
(Pakistan)