62581 – This question paper may be retained by candidatesFORMA

SOLUTION AT Australian Expert Writers

Assignment Details:
This question paper may be retained by candidatesFORMA L EXAMINATION PERIOD: SESSION 2, NOVEMBER 2020Unit Code: TELE8085Unit Name: 5G NetworksDuration of Exam(including reading time if applicable): 2 HoursTotal No. of Questions: 8Total No. of Pages(including this cover sheet): 5GENERAL INSTRUCTIONS TO STUDENTS:• Students are required to follow directions given by the Final Examination Supervisor and must refrain from communicating in any way with another student once they have entered the final examination venue.• Students may not write or mark the exam materials in any way during reading time.• Students may only access authorised materials during this examination. A list of authorised material is available on this cover sheet.• All watches must be removed and placed at the top of the exam desk and must remain there for the duration of the exam. All alarms, notifications and alerts must be switched off.• Students are not permitted to leave the exam room during the first hour (excluding reading time) and during the last 15 minutes of the examination. • If it is alleged you have breached these rules at any time during the examination, the matter may be reported to a University Discipline Committee for determination.EXAMINATION INSTRUCTIONS:Clearly label question numbers on each page of your answer booklets.Answer all (8) questions.Questions 1 and 8 are each worth 20 marks.Questions 2, 3, 4, 5, 6, and 7 are worth 10 marks.TOTAL marks for this paper = 100 marksAnswers must be written in this examination PaperExam start time: 3:00PMExam end time: 5:00PMExam to be submitted by: 5:30PMAIDS AND MATERIALS PERMITTED/NOT PERMITTED:Dictionaries: No dictionaries permittedCalculators: No calculators permittedOther: Closed book – No notes or textbooks permittedCopyright © Macquarie University. Copying or distribution of part or all of the contents in any form is prohibited.Q1: Insert a T beside each correct statement and F beside each false statement:A. 5G has only one Numerology like 4G equals 15 KHz (F)B. Cell coverage equals gNB coverage (T)C. Multiple beams provide 5G cell coverage (T)D. 5G cell uses multi factor authentication for UEs access (T)E. 5G cell uses the same TTI for different Applications (F)F. 5G system uses different slices for different application services (T)G. 5G currently using VoLTE Technology for voice calls (T)H. 5G non- standalone is using 5G core (F)I. 5G will use software defined core and AI for automation purposes (T) J. 5G system will use AI and deep learning to reduce resiliency (F)Q2: Define each of the following terms within 1-3 lines each.Zero-day attack: it is unknown attacks or threats. These threats happen when the attackers exploit a vulnerability in hardware or software.One day attack: they are known threats, which have signature or fingerprint. Also, their mitigation strategies are already existing to stop the attacks.C-RAN: it is a centralized, cloud computing based architecture for radio access network (RAN) that enables large-scale deployment, collaborative radio technology support, and real time virtualization capabilities.PC5: It is the direct communication between vehicle and other devices. It refers to reference point where the User Equipment (UE) for example mobile phone communicates directly with another UE over direct channel.O-RAN: Open Radio Access Network: its architecture integrates a modular base station software stack on off -the-shelf hardware which allows baseband and radio unit components from discrete suppliers to operate seamlessly together.Q3: Fill in the 2nd and 3rd column in the table below:5G Use Cases 5G KPI 5G SpecificationeMBBDate Rate10-20Gbps peak100 Mbps whenever needed10000x more trafficMobility Speed 500 km/hUse Scenario Marco and small cellsNetwork Energy Efficiency Network energy saving by 100 xURLLC Connection Density 2 X 105 – 106 /km2Coverage Long RangeDate rate 1 – 100 kbpsBattery Life 10 yearsCost M2M ultra low costAccess method Asynchronous accessmMTCLatency1ms air interface latency5 ms E2E latencyReliable and available 99.9999%Date Rate 50 kbps – 1o MbpsMobility High speed mobilityQ4: Draw the 5G split RAN architecture.Q5: Name 3 major applications for 5G URLLC. Write a one-line description of each application and outline the main requirements for each.Ultra-Reliable Low Latency communication will be a major game changer for 5G. the three major application for this:Autonomous vehicle: communicating between vehicle with each other will be enable by this application and self-driving. Main requirement for autonomous vehicle is low latency, in 5G it will be around 10 ms.5G IoT in smart City Infrastructure and Traffic Management: managing the traffic congestion and route emergency vehicle by this application will help populated cities. Connecting all sensors to the database and acting on it is the major requirement.IoT applications for Drones: better filming, photography will be delivered by the drones and the logistic industry will be changed. Communicating between drones and controllers will be enabled by 5G with low latency and traveling long distance.Q6: What is the zero-trust network access concept?- All traffic is accessed the network in secure Manner regardless of the location (perimeter security is not safe anymore)- Acces control must be strictly enforces- Inspect and log all TrafficZero Trust- Verify but never trust- Log all traffic and inspect it all (Deep inspection/DL)Q7: For the different cell types and different mobile networks generations fill in column 2 and 3 for the most suitable frequency for cell types in column1:Cell Type 4G&or 5G FrequencyLTE/5G Full coverage with less than 1 GHz)& Hot spots (3.3 to 4.2 GHz) – LTE/5G(3.6 to 4.5 GHz) – 5GHotsopt – 5G Dense Urban High DataRates at 3.5 to 4.5 GHzHotspot 10 Gbps at 28/39GHz5G mmWaves at 24.25 to 27.5 GHz, 31.8 to 33.4 Ghz and approx. 40, 50, 70 GHzQ8: Draw the 5G gNB cell beam sweeping by SSB, mapped in time and space, for 2 user, show example RSRP for each SSB per user and which key metrics used for UE to select SSB. (20 Mark)1. Multiple SSBs are being transmitted with a certain interval.2. Each SSB can be identified by a unique number called SSB index3. Each SSB is transmitted via a specific beam radiated in a certain direction4. Multiple UEs are located at various places around a gNB.5. UE measures the signal strength of each SSB it detected for a certain period (a period of one SSB Set).End of Exam Questions

Order from Australian Expert Writers
Best Australian Academic Writers

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER