0% found this document useful (0 votes)
63 views

SOLVED Wireless Communication CSI-410 Past Paper Spring 2023

wireless communication

Uploaded by

applecherry685
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

SOLVED Wireless Communication CSI-410 Past Paper Spring 2023

wireless communication

Uploaded by

applecherry685
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SOLVED Wireless Communication CSI-410 Past Paper Spring 2023

Degree: BS Computer Science Course Title:Wireless Communication

Part : Subjective Course Code: CSI-410

Question #2:What is the fundamental difference between analog and digital


signals in wireless communication? Also discuss signal impairment.
Introduction:
Wireless communication allows information to be sent without the use of physical wires, using signals
that can be either analog or digital. These signals carry the data over the air, but they face challenges
along the way, known as signal impairments. In this answer, we will explain the key differences
between analog and digital signals and also discuss how signal impairments can affect
communication.

1. Difference Between Analog and Digital Signals:


Analog Signals:

● Definition: Analog signals are continuous and can take any value over time. They change
smoothly and can represent real-world information like sound, light, or temperature.
● Characteristics:
○ Continuous: Analog signals are smooth and flow without breaks.
○ Infinite Values: They can take any possible value within a certain range.
○ Changes Over Time: The signal continuously varies based on the information being
sent.
● Example:
○ FM radio signals are analog. The signal changes smoothly to represent the sound
waves we hear on the radio.
● Usage in Wireless Communication:
○ Analog signals are used in older technologies such as AM/FM radio, analog TV, and
traditional landline phones.

Digital Signals:

● Definition: Digital signals are made up of discrete, fixed values, usually represented as binary
(0s and 1s). They are not continuous like analog signals.
● Characteristics:
○ Discrete Values: Digital signals can only have specific values (0 or 1).
○ Pulse-Like: They are represented by a series of pulses, each indicating a binary
value.
○ Non-Continuous: They switch sharply between different states (high or low).
● Example:
○ Wi-Fi signals that carry data for the internet use digital signals, transmitting
information in the form of 0s and 1s.
● Usage in Wireless Communication:
○ Digital signals are used in most modern systems like mobile networks (4G, 5G),
Bluetooth, and satellite communication because they are faster and more reliable.

Key Differences between Analog and Digital Signals:

Aspect Analog Signals Digital Signals

Nature Continuous and smooth Discrete, taking fixed values (0 or 1)

Value Range Can have any value Can only take specific values (e.g., 0 and 1)

Noise Sensitivity More affected by noise and Less affected by noise, more reliable
distortion

Data Capacity Lower data capacity Higher data capacity, suitable for fast data

Error Detection Difficult to detect and fix Easier to detect and fix errors
errors

Example FM radio, analog TV, voice Wi-Fi, mobile networks, Bluetooth


over AM

2. Signal Impairment:
When signals are sent through the air, they face several problems, known as signal impairments.
These impairments affect the quality and strength of the signal, making communication less effective.
The three main types of signal impairment are attenuation, noise, and interference.

a. Attenuation:

● Definition: Attenuation is the weakening of the signal strength as it travels through the air or
across long distances.
● Cause:
○ As the signal moves farther from its source or passes through obstacles (like walls or
buildings), it loses strength.
● Effect on Wireless Communication:
○ The signal may become too weak for the receiver to detect, leading to poor reception
or even a loss of connection.
● Example:
○ When you move far away from a Wi-Fi router, the internet connection slows down or
drops due to attenuation.

b. Noise:

● Definition: Noise is unwanted electrical signals or interference that mix with the original
signal and cause distortion.
● Cause:
○ Noise can come from many sources, such as other electrical devices, power lines, or
natural events (e.g., lightning).
● Effect on Wireless Communication:
○ Noise makes it harder for the receiver to correctly understand the signal, reducing the
quality of communication.
● Example:
○ Static or hissing sounds on a radio station when you drive through a tunnel are caused
by noise interfering with the radio signal.

c. Interference:

● Definition: Interference happens when two or more signals overlap and disturb each other,
leading to confusion or loss of data.
● Cause:
○ Interference usually occurs when multiple devices are using the same frequency or
nearby frequencies. This overlap causes the signals to mix and disrupt
communication.
● Effect on Wireless Communication:
○ Interference can cause slow data speeds, dropped connections, or complete signal
loss.
● Example:
○ If two Wi-Fi networks in the same area use the same frequency, they may interfere
with each other, making both networks slower.

Other Types of Signal Impairment:

● Multipath Fading:
○ This occurs when the signal takes multiple paths to reach the receiver due to
reflections from buildings or other objects. The different paths can interfere with each
other, causing signal loss.
● Doppler Shift:
○ When the source or receiver is moving (such as a car using mobile data), the
frequency of the signal can change due to the Doppler effect, which can distort the
signal.

Question #3: (a)What is the I33 B03.11 standard commonly known as? Briefly
explain its purpose and some of its variants.
1. I33 B03.11 Standard:

The I33 B03.11 standard is commonly known as the IEEE 802.11 standard. This standard is a set of
specifications that define how wireless local area networks (WLANs) operate. It is most widely
recognized as the basis for Wi-Fi technology, which allows wireless devices to communicate with
each other over short distances without the need for cables.

2. Purpose of IEEE 802.11 Standard:

The main purpose of the IEEE 802.11 standard is to ensure that different wireless devices, such as
laptops, smartphones, routers, and access points, can communicate with each other reliably and
efficiently within a WLAN. This standard defines how data is transmitted over radio waves, how
devices connect to networks, and how they handle issues like interference or security.

Key goals of the IEEE 802.11 standard include:

● Enabling wireless communication between devices.


● Providing secure and reliable data transmission.
● Improving speed and performance of wireless networks.
● Standardizing protocols to ensure compatibility between devices from different
manufacturers.

3. Variants of IEEE 802.11 Standard:

Over time, several versions (or variants) of the IEEE 802.11 standard have been developed to improve
performance, increase data speeds, and expand coverage. Some of the major variants include:

● IEEE 802.11a:
○ Introduced in 1999, this variant operates in the 5 GHz frequency band and supports
data rates up to 54 Mbps.
○ It offers less interference but has a shorter range compared to later versions.
● IEEE 802.11b:
○ Also introduced in 1999, it operates in the 2.4 GHz frequency band and supports
data rates up to 11 Mbps.
○ It has a longer range than 802.11a but is more prone to interference from other
devices like microwaves or cordless phones.
● IEEE 802.11g:
○ Released in 2003, it operates in the 2.4 GHz band and supports data rates up to 54
Mbps, combining the higher speed of 802.11a with the longer range of 802.11b.
● IEEE 802.11n (Wi-Fi 4):
○ Introduced in 2009, it operates in both the 2.4 GHz and 5 GHz bands and supports
data rates up to 600 Mbps. It uses multiple antennas (MIMO) to increase speed and
range.
● IEEE 802.11ac (Wi-Fi 5):
○ Released in 2013, this variant works in the 5 GHz band and can achieve data rates up
to 1.3 Gbps. It supports more antennas and higher channel bandwidths, making it
faster and more efficient for streaming and large file transfers.
● IEEE 802.11ax (Wi-Fi 6):
○ The latest version, introduced in 2019, operates in both 2.4 GHz and 5 GHz bands
and supports speeds up to 9.6 Gbps. It focuses on improving network performance in
crowded areas with many devices (like stadiums or offices) by reducing congestion.

Question #3: (b) Why is it important to secure wireless networks? Mention some
common security risks associated with open Wi-Fi networks.
1. Importance of Securing Wireless Networks:

Securing wireless networks is essential to protect the data and privacy of users. Since wireless
networks transmit data over the air, they are more vulnerable to eavesdropping and unauthorized
access compared to wired networks. Without proper security, attackers can easily intercept data, steal
personal information, or misuse the network. Securing a wireless network ensures that only authorized
users can access the network, and it protects sensitive information from being exposed to potential
threats.

Key reasons to secure wireless networks:

● Prevent unauthorized access: Ensures that only trusted users can connect to the network.
● Protect sensitive data: Safeguards personal or business information, such as passwords,
financial details, and private communications.
● Avoid malicious attacks: Protects the network from hackers who may try to exploit
vulnerabilities, infect devices with malware, or launch denial-of-service (DoS) attacks.
● Maintain network performance: Prevents unauthorized users from slowing down the
network by using up bandwidth.
2. Common Security Risks Associated with Open Wi-Fi Networks:

An open Wi-Fi network is one that does not require a password to join, making it easy for anyone to
connect. While convenient, open Wi-Fi networks pose several security risks:

● a. Eavesdropping (Packet Sniffing):


○ Definition: Attackers can capture data being transmitted over the network. Since
open Wi-Fi networks don’t encrypt the data, it’s easy for hackers to intercept sensitive
information like passwords, credit card numbers, or private messages.
○ Example: Someone connected to a coffee shop’s open Wi-Fi could intercept another
user's login details or personal information.
● b. Man-in-the-Middle (MITM) Attacks:
○ Definition: In this attack, a hacker intercepts the communication between two devices
(e.g., between a user and a website) and can alter the messages or steal data.
○ Example: An attacker can intercept a user’s online banking session, pretending to be
the bank, and steal sensitive financial information.
● c. Unauthorized Access:
○ Definition: Anyone can connect to an open Wi-Fi network, including hackers who
may want to use the network for malicious activities, such as sending spam,
launching attacks, or accessing shared files.
○ Example: An attacker could join a public Wi-Fi network in a library and access
shared files or devices on the network, leading to potential data breaches.
● d. Malware Distribution:
○ Definition: Hackers can use open Wi-Fi networks to distribute malware to connected
devices. Once infected, these devices can be controlled or monitored by the attacker.
○ Example: A hacker could spread malicious software to devices connected to an open
Wi-Fi network, infecting them with viruses, ransomware, or spyware.
● e. Fake Wi-Fi Networks (Rogue Hotspots):
○ Definition: Attackers can set up fake Wi-Fi networks that look like legitimate public
networks to trick users into connecting. Once connected, the hacker can steal personal
information or install malware on their devices.
○ Example: A hacker could set up a rogue Wi-Fi network named
"CoffeeShop_FreeWiFi" near a café, and unsuspecting users might connect, allowing
the attacker to access their data.

Question #4:What are Random Access Control Protocols? Also differentiate


between CSMA/CD and CSMA/CA.
1. Random Access Control Protocols:

Random Access Control Protocols are used in communication networks to manage how multiple
devices (or users) share a common communication channel. These protocols allow devices to transmit
data whenever they need to, but they also include methods to handle situations where multiple devices
try to send data at the same time (collisions). The protocols operate in a way that each device accesses
the communication medium (like a Wi-Fi channel or Ethernet) randomly, without being assigned a
specific time slot or order.

Key Features of Random Access Protocols:

● Devices do not have a fixed schedule for sending data.


● Collisions can happen when two devices send data simultaneously.
● Protocols include mechanisms to detect or avoid collisions to ensure smooth communication.
Common examples of random access protocols are CSMA/CD and CSMA/CA, which are used to
manage how devices access a shared medium like a Wi-Fi channel or Ethernet cable.

2. Difference Between CSMA/CD and CSMA/CA:

CSMA stands for Carrier Sense Multiple Access, which is a type of protocol where a device checks
(or "senses") the channel before trying to send data. If the channel is busy, the device waits until it
becomes free to avoid collisions. Both CSMA/CD and CSMA/CA are variations of this basic
protocol, with different methods to handle collisions.

a. CSMA/CD (Carrier Sense Multiple Access with Collision Detection):

● Definition: CSMA/CD is a protocol used in wired networks (like Ethernet) to detect


collisions when two or more devices try to send data at the same time.
● How it Works:
○ A device checks if the communication channel (Ethernet cable) is idle before
transmitting data.
○ If the channel is free, the device starts sending data.
○ If two devices accidentally send data at the same time, a collision occurs, and the
devices detect this collision.
○ Once a collision is detected, both devices stop transmitting and wait for a random
amount of time before trying again (called backoff time).
● Where it is Used:
○ CSMA/CD is used in wired networks, especially older Ethernet technologies like
10BASE-T. It is not commonly used in wireless networks because detecting collisions
in wireless signals is much harder.
● Example:
○ In a wired Ethernet network, when two computers try to send data over the same
cable simultaneously, CSMA/CD helps to detect the collision and manage the
retransmission.

b. CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance):

● Definition: CSMA/CA is a protocol used in wireless networks (like Wi-Fi) to avoid


collisions before they happen by using techniques that ensure only one device is transmitting
at a time.
● How it Works:
○ A device checks if the wireless channel is idle before attempting to send data.
○ If the channel is free, the device waits for a short random period (called backoff
time) to avoid any simultaneous transmissions.
○ Once the backoff period ends, if the channel is still free, the device sends a Request
to Send (RTS) message to the access point.
○ The access point responds with a Clear to Send (CTS) message, signaling that it is
safe to transmit data.
○ The device then sends its data, and once done, the channel is free for others to use.
● Where it is Used:
○ CSMA/CA is mainly used in wireless networks like Wi-Fi (IEEE 802.11 standards).
It is designed to avoid collisions since detecting collisions is much more difficult in
wireless environments.
● Example:
○ In a Wi-Fi network, when multiple devices try to send data, CSMA/CA ensures they
wait for their turn and use RTS/CTS messages to avoid collisions before sending data.

3. Key Differences Between CSMA/CD and CSMA/CA:


Aspect CSMA/CD (Collision Detection) CSMA/CA (Collision Avoidance)

Used In Wired networks (Ethernet) Wireless networks (Wi-Fi)

Collision Detects collisions after they occur Avoids collisions before they occur
Handling

Collision Collisions are detected by Collisions are avoided by using


Detection monitoring the signal RTS/CTS messages

Transmission Devices transmit immediately after Devices wait for a random backoff
Process sensing a free channel period before sending data

Suitability Works well in wired networks with Necessary for wireless networks where
low collision risks collision detection is difficult

Example Ethernet (10BASE-T, Wi-Fi (IEEE 802.11)


100BASE-T)

Question #5: Discuss the features and services of GSM? Also draw and describe
three important blocks of GSM(2G) Architecture.
1. Features of GSM (Global System for Mobile Communication):

GSM is a 2nd Generation (2G) mobile communication standard that was developed to improve voice
communication and support basic data services. It became the most widely used mobile
communication standard worldwide due to its many features.

Key features of GSM include:

● Digital Technology: GSM uses digital communication, offering better voice quality and more
efficient use of the frequency spectrum compared to analog systems.
● SIM Card: GSM introduced the use of Subscriber Identity Module (SIM) cards, which
store user information and allow users to switch between phones by swapping SIM cards.
● International Roaming: GSM provides global roaming capabilities, allowing users to use
their mobile phones in different countries where GSM networks are available.
● Efficient Spectrum Use: GSM operates on multiple frequency bands such as 900 MHz, 1800
MHz, and 1900 MHz, efficiently managing the use of the frequency spectrum.
● Encryption: To enhance security, GSM uses encryption methods to protect calls and data
from unauthorized access.
● SMS and MMS: GSM introduced Short Message Service (SMS) for text messaging and
Multimedia Messaging Service (MMS) for sending multimedia content like images and
videos.
● Support for Data Services: Although initially focused on voice communication, GSM
supports basic data services through General Packet Radio Service (GPRS) and Enhanced
Data rates for GSM Evolution (EDGE).
● Call Forwarding and Call Waiting: GSM provides several call management features such as
call forwarding, call waiting, call barring, and caller ID.

2. Services of GSM:

GSM offers three main types of services:

● a. Telephony Services (Teleservices):


○ This includes basic services such as voice calls, emergency calls, and SMS. Voice
calls are the primary service, offering good quality and reliability. SMS allows users
to send short text messages to other mobile users.
● b. Data Services (Bearer Services):
○ GSM supports data transmission for services like internet browsing, email, and fax
through technologies like GPRS and EDGE. These services enable users to access
the internet, transfer files, and perform online activities.
● c. Supplementary Services:
○ GSM provides several additional services such as call forwarding, call barring, call
waiting, caller ID, and conference calling. These services improve the user
experience by offering better control over incoming and outgoing calls.

3. GSM (2G) Architecture:

The GSM architecture is designed to support wireless communication across wide areas. It consists of
several blocks or subsystems that work together to provide seamless service to users. Here are the
three most important blocks:

a. Mobile Station (MS):


● Description: The Mobile Station (MS) is the user’s mobile device, which includes the
Mobile Equipment (ME) (like a mobile phone or tablet) and the Subscriber Identity
Module (SIM) card. The SIM card stores information such as the user’s identity (IMSI),
phone number, and authentication keys.
● Functions:
○ Communication: The MS allows the user to make and receive calls, send messages,
and access data services.
○ Mobility Management: The MS helps the network track the user's location for
incoming calls and messages.
○ Security: The MS provides authentication and encryption for secure communication.

b. Base Station Subsystem (BSS):


● Description: The Base Station Subsystem (BSS) is responsible for managing the wireless
communication between the Mobile Station (MS) and the network. It consists of two key
components:
○Base Transceiver Station (BTS): The BTS contains the radio equipment that
communicates directly with mobile devices. It handles the transmission and reception
of radio signals.
○ Base Station Controller (BSC): The BSC manages multiple BTSs and controls their
radio resources. It handles handovers (switching a call or data session between BTSs
when a user moves) and power management.
● Functions:
○ Radio Communication: The BTS establishes wireless communication with mobile
devices.
○ Resource Management: The BSC ensures efficient use of network resources and
handles handovers.

c. Network and Switching Subsystem (NSS):


● Description: The Network and Switching Subsystem (NSS) is the core part of the GSM
network that handles call routing, mobility management, and subscriber data. It includes
several key components:
○ Mobile Switching Center (MSC): The MSC is responsible for call routing, call
setup, and call termination. It connects mobile users to other mobile or landline users.
○ Home Location Register (HLR): The HLR stores permanent subscriber information
like the user's identity, phone number, and service subscription details.
○ Visitor Location Register (VLR): The VLR temporarily stores information about
users who are currently in a particular geographical area (visitors).
○ Authentication Center (AUC): The AUC ensures security by providing
authentication and encryption keys.
○ Equipment Identity Register (EIR): The EIR keeps track of the identity of mobile
devices, ensuring that stolen or unauthorized devices are blocked.
● Functions:
○ Call Management: The MSC routes calls to the correct destination and manages call
setup.
○ Subscriber Data: The HLR and VLR store and update user information, allowing the
network to locate and communicate with users.
○ Security: The AUC and EIR enhance the security of the network by managing
authentication and device authorization.

GSM Architecture Diagram:


Below is a simple diagram of the GSM Architecture showing the relationship between the key
components:

+---------------------------------------+

| Network and Switching Subsystem (NSS) |

| +-------------------------------------------+ |

| | MSC, HLR, VLR, AUC, EIR | |

+----+-------------------------------------------+----+

|
|

+------v--------+

| Base Station Subsystem (BSS) |

| +----------------------------+ |

| | BSC + BTS | |

+--+----------------------------+---+

+------v--------+

| Mobile Station (MS) |

+----------------------------+

Past paper solved by Muhammad Abdullah Ahsan. For educational support only. Sharing this solution
on social media for student assistance falls under 'fair use' for non-commercial educational purposes.
Unauthorized sale or misuse is prohibited under Section 2 of the Copyright Ordinance, 1962
(Pakistan)

You might also like