QB Unit 5 Answers
QB Unit 5 Answers
UNIT - V
1) 1 MARK
Disadvantage of UWB:
Supplementary Services:
Supplementary services are additional services that are provided in addition
to teleservices and bearer services. These services include
1.Call hold
2.Call waiting
3.Call forwarding
4.Call barring: Call Barring is useful to restrict certain types of outgoing calls
such as ISD or stop incoming calls from undesired numbers.
5.Calling Line Identification: This service displays the telephone number of
the calling party on the screen.
6.Connected Line Identification: This service is provided to give the calling
party the telephone number of the person to whom they are connected.
7.Multiparty communications:The multiparty service allows a mobile
subscriber to establish a multiparty conversation.that is, a simultaneous
conversation between three or more subscribers to setup a conference call.
8.Closed user group: This service is provided on GSM to enable groups of
subscribers to only call each other. This type of services are being offered
with special discount and is limited only to those members who wish to talk
to each other.
9.Advice of Charge: This service was designed to give the subscriber an
indication of the cost of the services as they are used.
10.Operator determined call barring: Restriction of certain features from
individual subscribers by operator.
Mid-IR: The intermediate IR band, also called the mid-IR band, covers
wavelengths that range from 1,300 nm to 3,000 nm, or 1.3 microns to 3
microns. Frequencies range from 20 THz to 215 THz.
1.It has limited range of approx 5 meters and it cannot penetrate walls or
other obstacles.
2.It works only in direct line of sight between the transmitter and receiver.
Even the smallest obstruction will disrupt communication.
3.Infrared communication can take place only between two devices at a time
limiting its use to control multiple devices.
4.It has relatively low data transfer speeds compared to technologies like
Bluetooth or Wi-Fi.
5.Bright ambient light, including sunlight and strong artificial lighting, can
interfere with infrared signals and degrade the quality of communication.
3) 5 MARKS
The tag is a very thin label like device into which is embedded a simple
passive single-chip radio transceiver and antenna.The chip also contains a
memory that stores a digital ID code unique to the tagged item. For the
item to be identified, it must pass by the interrogation or reader unit, or
the reader unit must physically go to a location near the item. Longer-
range systems cover a complete building or area. The reader unit sends
out a radio signal that may travel from a few inches up to no more than
100 ft or so. The radio signal is strong enough to activate the tag. The tag
rectifies and filters the RF signal into direct current that operates the
transceiver. This activates a low-power transmitter that sends a signal
back to the interrogator unit along with its embedded ID code. The reader
then checks its attached computer, where it notes the presence of the item
and may perform other processing tasks associated with the application.
ZigBeeRouter(ZR):
A router has the following characteristics:
1.It must join a ZigBee network before it can transmit, receive or route
data.
2.After joining, it can allow routers and end devices to join the network.
3.After joining, it can route data.
4.It ca not sleep. It has to be always awake.
In the mesh topology, most of the nodes are ZRs, which can serve as
monitor and control points but also can repeat or route data to and from
other nodes. The value of the mesh topology is that it can greatly extend
the range of the network. If a node lacks the power or position to reach
the desired node, it can transmit its data through adjacent nodes that pass
along the data until the desired location is reached. While the maximum
range between nodes may be only 30 m or less, the range is multiplied by
passing data from node to node over a much longer range and wider area.
2) IEEE 802.11a:
The 802.11a standard was developed next. It uses the unlicensed 5-GHz
band. There are three authorized segments: 5.15 to 5.25 GHz with 50-
mW maximum power, 5.25 to 5.35 GHz with 250-mW maximum power,
and 5.725 to 5.825 GHz at a maximum of 1 W of power. Each of these
bands is divided into multiple nonoverlapping 20-MHz-wide channels.
Each channel is designed to carry an OFDM signal made up of 52
subcarriers, 48 for data and the other 4 for error correction codes. Each of
the subcarriers is about 300 kHz wide.
As with the 802.11b standard, the 802.11a version supports a wide range
of data rates. The fastest is 54 Mbps upto a range of 50ft. Other backoff
rates usually include 48, 36, 24, 18, 12, 9, and 6 Mbps. Each uses a
different modulation scheme. For 6 Mbps, BPSK is used. For 12 Mbps,
QPSK is used. For the higher rates, QAM is used; 16-QAM gives 24
Mbps, while 64-QAM is used to achieve 54 Mbps. The standard provides
for backoff data rates as the link conditions deteriorate due to increased
range, noise, or multipath interference.
3) IEEE 802.11g
The 802.11g standard was an attempt to extend the data rate within the
popular 2.4-GHz band. Using OFDM, this standard provides for a
maximum data rate of 54 Mbps at 100 ft indoors. As with the 802.11a
standard, there are lower backoff rates of 48, 36, 24,18,12,11,9,6,5.5,2
and 1Mbps as the communications path degrades. The 802.11g standard
also accommodates the 802.11b standards and so is fully backward-
compatible. An 802.11b transceiver can talk to an 802.11g AP but at the
lower data rate. An 802.11g transceiver can also talk to an 802.11b AP
but also at the lower data rate.
4) IEEE 802.11n
The 802.11n version was developed to further increase the data rate. It
also uses both the 2.4-GHz and 5-GHz bands and OFDM. A primary
feature of this standard is the use of multiple-input multiple-output
(MIMO) antenna systems to improve reliability of the link. APs for
802.11n use two or more transmit antennas and three or more receive
antennas. The wireless nodes use a similar arrangement. In each case,
multiple transceivers are required for the AP and the node. This
arrangement permits a data rate in the 100- to 600-Mbps range at a
distance up to 100 ft.
5) IEEE 802.11ac:
One of the newest versions of the standard is 802.11ac. 11ac uses the 5-
GHz ISM band only, for minimum interference and maximum available
bandwidth. Furthermore, it continues the use of MIMO and OFDM.
However, some key changes boost the theoretical data rate above 3 Gbps
depending on modulation, channel bandwidth, and MIMO configuration.
6)IEEE 802.11ad
The 11ad version is also known by its trade name WiGig.
WiGi uses the unlicensed ISM 60-GHz band from 57 to 64 GHz. The
technology divides this into four 2.16-GHz-wide bands. The primary
modulation scheme is OFDM, which can support a data rate up to 7 Gbps,
making it one of the fastest wireless technologies available. The standard
also defines a single-carrier mode that uses less power; this is a better fit
for some portable handheld devices. The single-carrier mode can deliver
a data rate up to 4.6 Gbps. Both speeds permit transmission of
uncompressed video.
Error Counter: It Increments the counter for each error identified by the
comparator by providing a measure for signal transmission quality and
accuracy.
Advantages of WCDMA
1)Higher data rates and capacity due to wider bandwidth channels and
advanced modulation techniques.
2)Spectral efficiency and network performance is enhanced for better
utilization of resources.
3)Support for multimedia applications such as video streaming and online
gaming with improved quality.
4)Seamless handover between cells for uninterrupted connectivity during
mobility.
5)Global standard for 3G networks which ensures interoperability and
roaming across different regions.
Disadvantages of WCDMA
Applications of WCDMA
1)Used in Mobile telephony for providing voice and data services with
faster speeds and better quality.
2)It Supports video streaming, online gaming, and mobile internet
browsing.
3)Used in IoT devices for wide coverage and remote monitoring.
4)Essential for public safety and emergency services which ensures
reliable communication during crises.
5)Facilitating machine to machine connections for various purposes such
as asset tracking and telemetry.
4) 10 MARKS
a ) List out the types of Multiple Access Systems. Explain the working
of CDMA scheme
Ans:The types of Multiple Access Systems are
1. Frequency Division Multiple Access(FDMA)
2. Time Division Multiple Access(TDMA)
3. Code Division Multiple Access(CDMA)
Two commonly used techniques for spreading the spectrum are frequency
hopping and direct sequencing.
Frequency hopping(FH):
Frequency-hopping spread spectrum was first used by the military to
ensure reliable antijam and to secure communications in a battlefield
environment. The fundamental concept of frequency hopping is to break
a message into fixed-size blocks of data with each block transmitted in
sequence except on a different carrier frequency. With frequency hopping,
a pseudorandom code is used to generate a unique frequency-hopping
sequence. The sequence in which the frequencies are selected must be
known by both the transmitter and the receiver prior to the beginning of
the transmission. The transmitter sends one block on a radio-frequency
carrier and then switches (hops) to the next frequency in the sequence and
so on. After reception of a block of data on one frequency, the receiver
switches to the next frequency in the sequence. Each transmitter in the
system has a different hopping sequence to prevent one subscriber from
interfering with transmissions from other subscribers using the same
radio channel frequency.
Principles of CDMA:
3) The PN codes used in a system are orthogonal means the codes should
not correlate among themselves nor they be time shifted version of each
other. Therefore, each signal with a unique PN code can be detected from
other signals. When a PN code is auto-correlated, the result is high (1) but
when cross-correlated with other PN code in the same set, the result is
zero (0). PN coded sequence are generated by using one or more shift
registers with specific feedback connections. This PN spreading code is
often called as chipping code. An important characteristic of spread
spectrum system is its processing gain Gp, which is proportional to the
ratio of spreading code rate to the data rate.
𝑅𝑐ℎ𝑖𝑝
𝑝 =𝑅
𝑑𝑎𝑡𝑎
Long PN Code:
Long codes run at 1.2288 Mb/s and are 242-1 bits long (created using a
42 bits Linear Feedback Shift Register). It takes approx 41.2 days to
repeat a long code at this rate. It is used for both encryption and spreading.
Encryption is achieved by using a mask called Long Code mask which is
a created using a 64-bit authentication key called A-key (assigned by
CAVE protocol) and Electronic Serial Number ( ESN – assigned each
user based on the mobile number). The Long code changes each time a
new connection is created
Short PN Code:
The Short code is PN sequence that is 215-1 bits in length.This code is
used for final spreading of the signal and is transmitted as a reference
known as the Pilot Carrier by the base station. The same short code is
used by all the base stations.Base stations are differentiated from one
another by offsetting their transmission of this code in time.This time
offset is called as a PN Offset.Mobile units initially search until they
synchronize with a pilot code transmitted by a base station.The base
station then conveys timing information to the mobile.
Pilot Channel − It is a reference channel which the mobile station uses for
synchronization and provides phase reference for coherent demodulation.
It is transmitted at all times by each base station on each active CDMA
frequency. Each mobile station tracks this signal continuously and uses
the pilot signal to monitor and adjust the power needed in order to
transmit back to the base station. CDMA system relies heavily on power
control.The users which are closer to the base station must transmit at
lower power, those at far away must use a higher power. This has to be
decided by some kind of a control channel and pilot channel is used to do
that.
Paging Channel(PCH)- The primary purpose is to send out pages, that is,
notifications of incoming calls, to the mobile stations. The base station
uses them to transmit system overhead information and mobile station-
specific messages. CDMA uses up to 7 paging channels. The paging
channel transmits overhead information such as commands and
pages to the mobile. The paging channel also sends commands and traffic
channel assignment during call setup. It may also be used to inform a
mobile, which is already involved in a call to get ready to switch to a
traffic channel owned by neighbouring cell,whose coverage area this
mobile has entered. Such handoff direction messages are always
conveyed using the paging channel. These channels are also used to
initiate outgoing calls.
Access Channel
The mobile uses the access channel when not assigned to a traffic channel.
The mobile uses the access channels to originate calls, to determine what
paging channels it should monitor, respond to pages and to re register
with a new network or system when the mobile has roamed outside its
parent network
Traffic Channel:
The reverse link traffic channel is used only when there is a call. The
reverse traffic channel transmits voice data to the BTS, it also transmits
the overhead control information during the call.The mobile goes to
access mode if there is a call initiated; go to the traffic mode and then go
back to the idle mode once the voice communication is over. The
maximum data rate per channel is 14.4 kbps.
In the Europe and Asia, the GSM operates in 900 to 1800 MHz frequency
range, whereas in United States and other American countries, it operates
in the 850 to 1900 MHz frequency range. It uses the digital air interface
wherein the analog signals are converted to digital signals before
transmission. The transmission speed is 270 Kbps.
Interfaces:
1.Um Interface: The air interface between the mobile station (MS) and
the BTS.
2.Abis Interface: Connects the BTS and the BSC, allowing for
communication and control between these components.
3.A Interface: Connects the BSC to the Mobile Switching Center (MSC),
facilitating communication between the BSS and the core network.
Network Switching Subsystem:
MOBILE STATION(MS):
The wireless mobile telephone used by the subscriber is called the MS
(Mobile Station). MS includes radio equipment and the man machine
interface that a user needs, in order to access the services provided by the
GSM MS can be installed in vehicles or can be portable or hand-held.
The MS may include provisions for data communication as well as voice.
The primary functions of MS are to transmit and receive voice and data
over the air interface of the GSM system. MS performs the signal
processing function of digitizing, encoding, error protecting, encrypting,
and modulating the transmitted signals. It also performs the inverse
functions on the received signals from the BS.
c ) Explain about the Bluetooth and Zig Bee and write their
application in daily life.
Ans:
Bluetooth:
Bluetooth is a digital radio standard that uses frequency-hopping spread
spectrum (FHSS) in the unlicensed 2.4-GHz ISM band. It hops over 79
frequencies spaced 1 MHz apart from 2.402 to 2.480 GHz. The hop rate
is 1600 hops per second. The dwell time on each frequency, therefore, is
1/1600 = 625 µs. During this time, digital data is transmitted. The total
data rate is 1 Mbps, but some of that is overhead (headers, error
detection and correction, etc.)The data, which may be voice or any other
digitized information, is put into packets and transmitted sequentially in
as many as five time slots. The serial data signal is Gaussian-filtered, and
then FSK is used for modulation.
A gross data rate of 2.1 Mbps is achieved by using a form of QPSK called
DQPSK.To reach the 3-Mbps rate, an eight-phase differential phase-shift
keying (8DPSK) modulation scheme is used.
Other features of BLE are a power output of 0 dBm (1 mW) and a typical
maximum range of 50 meters. Security is 128-bit AES. Link reliability is
improved with the use of an adaptive frequency-hopping technique that
avoids interference, a 24-bit CRC, and a 32-bit Message Integrity Check.
The main applications for Bluetooth are cordless headsets for cell phones
and hands-free voice systems in cars and trucks. It is also the main
connection between smartphones and the accessory smart watches.
Bluetooth is also used in other wearables such as those for medical or fi
tness monitoring. Other uses include wireless human interface devices
(HIDs) such as keyboards, mice, and game controllers. Any wireless
connection over a short distance that is within the data rate capability of
Bluetooth is a potential application.
ZigBee:
All Zigbee devices have two different addresses, a 64-bit and a 16-bit
address.All Zigbee transmissions are sent using the source and destination
16-bit addresses. The routing tables on Zigbee devices also use 16-bit
addresses to determine how to route data packets through the network.
However, since the 16-bit address is not static, it is not a reliable way to
identify a device.To solve this problem, the 64-bit destination address is
often included in data transmissions to guarantee data is delivered to the
correct destination.
ZigBee defines three different device types: coordinator, router, and end
devices
ZigBee Coordinator(ZC):
Each ZigBee network must have one coordinator. A coordinator has the
following characteristics:
1.It selects the channel and PAN ID (both 64-bit and 16-bit) to start the
network.
2.It can allow routers and end devices to join the network.
3.It can assist in routing data.
4.It can not sleep. It has to be always awake.
ZigBeeRouter(ZR):
1.It must join a ZigBee network before it can transmit, receive or route
data.
2.After joining, it can allow routers and end devices to join the network.
3.After joining, it can route data.
4.It ca not sleep. It has to be always awake.
1.It must join a ZigBee network before it can transmit or receive data.
2.It can not allow devices to join the network.
3.It must always transmit and receive RF data through its parent.
4.It cannot route data.
5.It can sleep.
The ZigBee standard supports three topologies: star, mesh, and cluster
tree. The most commonly used are the star and mesh, illustrated in Fig
below
In the mesh topology, most of the nodes are ZRs, which can serve as
monitor and control points but also can repeat or route data to and from
other nodes. The value of the mesh topology is that it can greatly extend
the range of the network. If a node lacks the power or position to reach
the desired node, it can transmit its data through adjacent nodes that pass
along the data until the desired location is reached. While the maximum
range between nodes may be only 30 m or less, the range is multiplied by
passing data from node to node over a much longer range and wider area.
Home Automation
a.Security Systems
b.Meter Reading Systems
c.Light Control Systems
d.HVAC(Heating Ventilation and Air Conditioning) Systems
Consumer Electronics
a.Gaming Consoles
b.Wireless Mouse
c.Wireless Remote Controls
Industrial Automation
a)Asset Management
b)Personnel Tracking
c)Livestock Tracking
Healthcare
a)Hotel Room Access
b)Fire Extinguishers