Escolar Documentos
Profissional Documentos
Cultura Documentos
06. (a)
(b)
What is frequency reuse distance? Explain how this term governs the cellular
~~m. ~
Write a short note on foliage loss. (3)
Explain the concept of cell sectoring. (3)
Differentiate between soft handoff and hold handoff. (3)
Write ashort note on concatenated codes. (3)
Discuss in short about Rayleigh fading channel. (3)
Write a short note on Vocoders. (3)
Differentiate between TDMA and CDMA technology. (3)
Unit-I
Explain basic cellular system with architecture diagram. What are the
functionalities of MJ SO in cellular system. (6.5)
Explain the following interference problems that occur in Mobile cellular system
and how these interferences can be minimized. (6)
(i) Adjacent channel interference (ii) Co-channel Interference.
Explain the concept of cell splitting and how it enhances the capacity of a cellular
system. (6.5)
Differentiate first generation and second generation mobile communication
systems. Give examples ineach case. (6)
Unit-II
Calculate the radiation resistance of an antenna, which is drawing 12 Amp
current and radiating 4.5KW. If antenna efficiency is 90% and power gain is 20,
find out the loss resistance and directivity of the antenna. (6.5)
Discuss about the various antenna structures and their radiation patterns used in'
Mobile cellular coverage. (6)
Explain how frequency management and channel assignment done in mobile
cellular systems. Differentiate fixed channel assignment and dynamic channel
assignment. (8.5)
With the help of diagram state what are ground incident angle and ground
elevation angle. (4)
Unit-III
Explain Digital transmitter and receiver operation using OPSK Modulation and
OPSK Demodulation. Drawthe constellation diagram of OP8K signal. (6)
Explain how convolutional codes differ from Block codes. Explain the coding and
decoding inconvolutiol'lal code. (6.5)
Q7. Write short notes on the following:
(a) OFDM
(b) Turbo Coding
(6.5+6)
08. (a)
(b)
. Unit-IV
Explain how many types of channels are there in GSM. Write brief note on
framing structure of G8M. (8.5)
Describe a typical call howfar a mobile termina~ed call in G8M with diagram. (4)
Q9. Write brief notes on the following:
(a) IS-95 System
(b) Voice Signal processing and coding
************
(6.5+6)
w
w
w
.
n
i
e
c
d
e
l
h
i
.
a
c
.
i
n
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
(Please write your Exam Roll No.) Exam Roll No......................
END TERM EXAMINATION
EIGIlTHSEMESTER H.TEell; MAY -2010
Stlbject: Adificiallntelligence
Time: 3Hours, Maximum Marks :75
Note: Q.1 is compulsory. Attempt one question from each unit. Internal choice is indicated. I
Ql Giveashort answer:- (3x5=15)
(a)Classify the followingsearch algorithm as intelligent/non intelligent.
. Give reason of your answer: Depth first search, best first search,
branch and bound search.
(b)Howcan youclassify the knowledge? What isaninference engine?
(c)What are the merits/ demerits of semantic net over semantic frames?
(d)What are the different steps for natural processing?
( e ) Listvarious application areas where Neural network isused.
UNIT-I
Q2 (a)Compare depth first search and Hill Climbingsearch-procedures. (3)
(b)Explain the advantages of Best first search over Hill Climbing with
suitable example. (5)
(c)What are the steps to solve constraint satisfaction problem? Explain
themwithhelp of crypt arithmetical problem. (7)
OR
Q3 (a)Explain the process to reach goal state of a search tree which is
AND/OR graph. Give an example of application whose search tree is
AND/OR graph. (8)
(b)Explain the Means end analysis algorithm. Give an example of an
application where it isapplied. (7)
UNIT-II
Q4 (a)Explain the rules tounify twopredicates. (3)
(b)Represent followingfacts as predicates and convert them to clause
form, explaining the steps of conversion:- (5)
(i) Anystudent who is intelligent or hard working will pass the exam
ingoodmarks.
(ii)Anyone whoispassed withgoodmarks get ajob.
(c)Assume that "Shiva is neither hard working nor intelligent". Using
resolution prove that Shivadoes not get ajob. (7)
OR
Q5 (a)What kind of knowledge isrepresented bythe semantic nets? Givean
example of knowledge base represented bysemantic nets and explain
howinferences are done insemantic Nets? (8)
(b)Give an example of a game Tree. What is the purpose of Minimax
procedure ingame tree? What are AlphaBetacutoff? (7)
UNIT-III
Q6 (a)Consider the followingsentences: (5)
Most birds flyunless they have broken wings
Penguins and Ostrich donot fly.
Crowisabird
Use Nonmonotonic reasoning toanswer "DoesCrowFly"?
(b)Write short notes on handling uncertainty using probabilistic
reasoning. (5)
P.T.O.
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
(Please write your Exam Roll No.) Exam Roll No .
END TERM EXAMINATION
EIGHTHSEMESTER B.TECH. MA y-2010
~e_e_~~O_de: ETEC414/ET!!~Q~___ Subject: M obile Communication
Time: 3 Hours ---~- - -----------iVlaximum Marks :75
r- --- - --_ -_ -_ ..-.. -_.-_-.-_--_-N-_o-te-.- a:1--is-c-o-m-p-u-'s-o--r-y-.-'-n-te-rnal choice is.!._n_d'_c_a_te_d_. ._J
Ql (a) Mention various frequency reuse schemes. (5x5=25)
(b) Prove that for a hexagonal geometry, the co-channel reuse ratio is given by
Q =.J 3N, where N::.:: i
2
+ij +/ .
(c) What could be the impact of Foliageloss incalculating GOS?
(d) Define umbrella pattern effect. Also, mention its benefits.
(e) Discuss difference of fixedchannel assignment and non-fixed channel assignment.
(6)
(2.5)
UNIT-I
Q2 (a) Verifythe statement that as longas the cell size is fixed, CII is independent of the
transmitted power of eachcell. (4.5)
(b) What ispaging control? (2)
(c) Suppose there are 1001 radio channels and each has an area of 12km
2
and the
entire system covers an areaof 4200km
2
(6)
(i) Calculate systemcapacity if cluster size is7.
(ii) Howmany times would the cluster of size 4 have to be replicated in order to
approximately cover the entire cellular area?
(iii)Calculate the systemcapacity if the cluster sizeis 4.
(iv)Doesdecreasing the cluster sizeincrease the systemcapacity?
OR
Q3 (a) Define co-channel Interference for seven-cell cluster pattern. Also, find CCI for the
case whenmobile isat cell boundary. (6.5)
(b) Define Trunking efficiencyand Grade of service. (2)
(c) State cell splitting. If each cell is allocated 60 channels regardless of cell size. Find
the number of channels contained in a 3x3km
2
area without cell splitting i.e.
R=lkmand with cell splitting. (4)
UNIT-II
(a) Howcanyou obtain point topoint model (LeeModel)?
(b) What are the limitations of GPRS?
Q4
(6)
( 6. 5)
( 2 . 5)
(5)
(5)
OR
(a) Define spectrum efficiency.
(b) Compare AMPSand digital cellular systemwithrespect tovarious parameters.
(c) Whylocation update isrequired incellular system.
* * * * * * * * * * * *
I
(e) Derive pee spac~equation i.e. P,. ~ P,. ( 4;)' ' whe.e P,"transmitted f.ee powe.
Pr=Receivedpower, A . iswavelength, r isdistance between T
x
and R
x
. (4)
OR
Q5 (a) What are the merits of Twohand-off-level algorithm? Analyse it. (4)
(b) What do you understand by Dropped Call Rate? Discuss various methods to
improve it. (4)
(c) Define TwoRayModel for propagation inopen area. Also, findout incident angle for
a mobile communication if cell site antenna height is 100mand mobile antenna
height is2mand communication path is 10m. (4.5)
UNIT-III
Q6 (a) What are the different channels used inGSM system? Describe all set up channels
indetail and whythey are required? (6.5)
(b) Write indetail about OFDMtransmitter and Receiver. (6)
OR
Q7 (a) Drawdiagram of Turbo Encoder, why turbo coding is important in cellular mobile
system? (6)
(b) Mention differences between FDD(Frequency Division Duplexing) and TDD(Time
DivisionDuplexing). (6.5)
UNIT-IV
(a) What are various security levelsprovidedinGSM?
(b) Discuss salient features of IS-95.
Q8
Q9
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
( Ple ase write your Exam Roll No.) Exam Roll No.............
END TERM EXAMINATION
Pape r Code : ETCS404
Time : 3Hours
I
Subje ct: Software Te sting
Maximum Marks :75
Note : Q.1 is compulsory. Inte rnal choice is indicate d. I
Q1 (a) What is a software failure? Discuss the conditions of a failure. Mere presence of
faults may not lead tofailures. Explain with the help of an example. (2)
(b) Differentiate between the following:- (8x2=16)
(i) Stub and driver (ii)Static and dynamic testing tools
(iii)Program and software (iv)Test, Test case and Test Suite
(v) Performance and Functional testing (vi)Black box and White box testing
(vii)Verification and validation (viii)Positive and negative testing
(c) What is the relationship of V-shaped software life cycle model with waterfall model?
Howis acceptance testing related torequirement analysis and specification phase? (4)
(d) What is risk? What is the use of risk analysis? (3)
Q2 (a) Will exhaustive testing (evenif possible for avery small program) guarantee that the
program is 100%correct? (4)
(b) Testing is not a single phase in the software development life cycle. Explain and
comment. (4.5)
(c) There are two limitations insoftware testing:- (4)
(i) Input domain is too large totest (ii)Toomany paths inthe program
Justify these limitations with the help of suitable examples.
OR
(a) Discuss the advantages of testing with reference to the software product. (4)
(b) Verification and validation are used interchangeably many times. Define these terms
and establish their relationship with testing. (4)
(c) Define atest case. What are the objectives of test case design? Discuss the various
steps involved. (4.5)
gIven eow:
Average marks Grade
90-100 Exemplary Performance
75-89 Distinction
60-74 First division
50-59 Second Division
0-49 Fail
Q3 (a) Consider an example of grading a student in a university. The grading is done as
. b I
The marks of any three subjects are considered for the calculation of average marks.
Generate boundary value analysis test cases and robust test cases. Also, create
equivalence classes and generate test cases. (8.5)
(b) What are the limitations of boundary value analysis technique? Discuss the
situations inwhich it is not effective. (4)
OR
(a) A telephone company charges its customer using the following calling rates:- (3)
Call Rates
0-75 RS.500
76-200 Rs. 500+Rs. 0.80per call excess of 75
201-500 Rs. 500+Rs. 1.00per call excess of 200
>500 Rs. 500+Rs. 1.20 per unit excess of 500
Identify the equivalence class test cases for output domain.
(b) Showwith the help of an example that avery high level of statement coverage does
not mean that program isdefect free. (3)
(c) Consider aprogram given below. Find all du-paths and identify those du-paths that
are definition clear. {'-5' \
/*Program tocalculate total telephone bill amount tobe paid \ ..: J
by an customer /
#include<stdio.h>
#include<conio.h>
P.T.O.
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i
(Plectsewrite your Exam Roll No.) EXalll Roll No......................
END TERM EXAMINATION
_ _ _ _ _ _ _ _ _ _ _ _ _ _ EIGHTH SEMESTER (U:fECII.1 MAY -:~OlO _
~P~-'"Code: ETlT412 . " ~__" "__ " . Subject: Network Security J
Time: 3Hours M aximum M arks :75
[ ~_ ------N-o-te-:-Q--.-1-1-s-co-m-p-u-/s-o-r-y-. A-tt-e-m-p-t o-;;equiSiion "iiuiii-each Unit. =:J
Ql ~
(a) Compare and contrast the hash algorithms used inPGP and SIMIME
(b) Explain howdoes tunnel mode provide protection to the IF Packets
(c) Find greatest cormuon divisor of 161 and28by using Extended Euclidean
Algorithm.
(d) Derme the followings
(i) Codes ( ii ) Ciphers (iii) Confusion (iv) Diffusion
\ Jl\ ', ~
Q2. a) Explain Hill Cipher Technique by taking asuitable example.
Discuss any two disadvantages of Hill Cipher Technique
b) Briefly discuss Differential Cryptanalysis Attack inDES
Q3. a) Give adetail description of single round of DES algorithm
b) Explain the steps inPlayfair Cipher technique
UNIT-II
(3)
(3)
(3)
( 1.5 x4)
(10)
(5)
(10)
( 5)
Q4.a) Explain Diffie Hellman key exchange andexplain how does it suffer
fromMan-in-Middle attack. ( 10)
b) Explain Time Domain andFrequency Domain Scramblers. (5)
Q5.a) Performthe eilcryption anu decryption of the plain text, M=8,where recipients
RSA'public key are (n=77,e =17). (10)
b) Briefly explain Elliptic cUrve cryptography (5)
UNIT-III
Q6. a) Explain the Digital Signature Standard (DSS) approach todigital signatures (10)
b) What are some weaknesses of a Packet - filtering router (5)
Q7. a) Explain the various steps involved inthe Secured Socket Layer
(SSL) Record Protocol transmission. (10)
b) Discuss, Oakley Key Determination Protocol inIPSec. (5)
UNIT-IV
Q7. Explain indetail the TMN Architecture (15)
8. a)Briefly explain TMN management service architecture (10)
b) Discuss some implementation issues ofTMN (5)
************
N
o
r
t
h
e
r
n
I
n
d
i
a
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
N
e
w
D
e
l
h
i