Questions
Questions
15. RF Crystal Frequency, which is mostly used in Mobile Phone is of the value :-
(a)13MHz, (b)26MHz, (c)19.2MHz, (d) None of above
20. What is the key which you have to press in a telephone hand set, when you make a
change over from pulse dialing to tone dialing :-
(a)#, (b)*, (c)0, (d) None of above
29. What type of battery are used for the memory of a Mobile Handset :-
(a)Li-Ion, (b)Li-Cd, (c)Ni-Cd, (d) None of above
33. When the Hagar IC in a Nokia 3310/3315 is damaged, then the fallout is :-
(a)No Network, (b)No Display, (c)No Charging, (d) None of above
34. Write value of the resistor, having the colour code Red-Red-Red :-
(a)22MΩ, (b)22KΩ, (c)2.2KΩ, (d)22Ω
79. Porcelain is an
(a) Conductor
(b) Semiconductor
(c) Insulator
(d) None of these
80. Cu is a
(a) Conductor
(b) Semiconductor
(c) Insulator
(d) None of these
82. Thinner is
(a) Ethyl alcohol
(b) Trichloroethylene
(c) Isopropyl alcohol
(d) Methyl alcohol
87.Signal transmitted thru’ the local loop is(a) dc in nature(b) sinusoidal in nature
(c)pulsed in nature(d) none of these
91.TRAI stands for(a) Telephone regulatory authority of India (b)Telephone and radio
authority of India(c) total regulatory authority of India (d)none of these
92. Antenna in a mobile phone is used for(a) receiving only(b) transmitting only
(c)transmit and receive only(c) none of these
94 To activate SIM how many volts are required (a) +10 (b) +8 (c) +5 (d) +3
97. What is the full name of BAW filter (a) background audio wave filter
(b) Background acoustic wave filter(c) bulk acoustic wave filter (d) none of these
98. Mute stands for(a) audio stop(b) video stop(c) audio & video stop(d) none of these
99. What position should be done for ring signal alert in telephone (a)ON HOOK
(b)OFF HOOK(c) transmission (d) none
100. The power on voltage of a mobile (a) 3.2V (b) 3.6V(c) 2.8V (d) none of these
101. UEM stands for(a) unit energy measurement(b) universal energy measurement
(c) universal energy module(d) none of these
102. PAM stands for (a) pulse amplitude modulation (b) pulse altered modulation
(c) phase amplitude modulation(d) none of these
103. PCM stands for (a) phase control modulation(b) pulse code modulation(c) pulse
control modulation(d) none of these
104. ROM is a (a) Resistor (b) Integrated Circuit (c) Artery (d) Tranistor
105. 3G technology are used for (a)SMS(b) video calling(c) MMS(d) none
106. What kind of modulation is PCM(a) analog(b) digital(c) delta (d) none of these
107. Phase shift keying is what sort of modulation(a) digital(b) analog(c) delta(d) none
111. The full form of MIMO is (a) multiple i/p ,multiple o/p(b) max i/p, min o/p (c) min
i/p,max o/p (d) none of these
112. The melting point of unleaded solder is (a)350ºc(b) 450ºc (c)550ºc(d) none of these
117. Flash is a
(a) VRAM
(b) SRAM
(c) NVRAM
(d) None of these
119. TDMA is a
(a) Analog multiplexing technique
(b) Digital multiplexing technique
(c) Mixed multiplexing technique
(d) None of these
129. SIM is a
(a) Microprocessor
(b) I / O device
(c) Memory device
(d) None of these
130. FET is a
(a) Bi-polar device
(b) Uni-polar device
(c) Tri- polar device
(d) None of these
136. Two one resistor are connected in parallel then the equivalent resistance is -
(a) 05 Ohm
(b) 1 Ohm
(c) 2 Ohm
(d) None of these
141. Varistor is a
(a) VDR
(b) LDR
(c) CDR
(d) None of these
144. GSM is a
(a) Simplex,
(b) Half-Duplex,
(c) Duplex,
(d) None of these
Answer :
4. What are major component in the PCB? For what purpose it has been Designed?
(Ans) Resistor & Capacitor (Non-Polarity)
11. When mobile fall’s down Which chip component get damaged? what fault?
(Ans) RTC Dead
What is the temperature for desoldering SMD Components and IC in BGA Rework Station?
150C to 400 C
Free tools:
Appium, Robotium, KIF, Calabash
The First Mobile Phone Call Was Made 40 Years Ago Today. On April 3, 1973, Motorola
employee Martin Cooper stood in midtown Manhattan and placed a call to the headquarters of
Bell Labs in New Jersey.in chooper
How long did it take Martin Cooper to invent the cell phone?
40 years ago today, April 3, 1973, the first cell phone call was made by Motorola engineer
Martin Cooper. He called his competitor at Bell Labs to gloat at having beat them. It was 40
years ago today, April 3, 1973.
How much did the first mobile phone cost in today's terms?
It would take a decade before Motorola's DynaTAC finally reached consumer hands. On
September 21, 1983, Motorola made history when the FCC approved the 8000X, the world's first
commercial portable cell phone. It cost consumers a whopping$3,995 at the time.
Answer :B
Topic : What is a Cellular Network?
Each cell has a base station. Cells when
grouped together forms a cluster. MSC is
connected to all the base stations in a
cluster. MSC itself is connected
to MSCs of other clusters and to
the PSTN switching centre. The full
answer is shown on the left.
Answer : C
Topic : GSM
I. Digital Technology.
II. Frequency re-use.
III. CDMA and TDMA.
IV. Using VLRs in each area and the HLR in the network switching centre.
A. I and II
B. I and III
C. II and III
D. IV only
Answer
Answer
3. Which of these statements are correct?
A. III only
B. I, II and IV
C. III and IV
D. I and II
Answer
Answer
A. II only
B. III only
C. I and IV
D. II and III
Answer
2. Why does GSM use TDMA, as opposed to CDMA?
A. I and III
B. I only
C. II and III
D. I and IV
Answer
Answer
3. Which of the four cellular networks in the UK is the best and why?
A. Mercury, because it offers good service within its covered area.
B. Orange, because of its good "inside building" coverage.
C. Vodafone, because it uses GSM
D. Cellnet , because it offers a wider range of phones-sets
Answer
I. The diagram above shows two adjacent cells using the a4 channel
after borrowing.
II. Channel a4 is possibly locked to cells marked N.
III. The handover rate will increase after borrowing
A. I, II and III
B. II only
C. II and IV
D. I and II
Answer
Answer
3. There are five cars(C1, C2, C3, C4 and C5) moving away from cell A into
cell B. The table below shows the time at which each car arrives at the
handover threshold and the speed at which they are travelling.
o All the cars are travelling away from the handover threshold towards
the receiver threshold.
o none of the cars have reached the receiver threshold at 100ms.
o the handover area is divided into infinite power level ratios.
The choices below shows the possible arrangement of the FIFO queue and
the MBPS queue of the handover requests at 100ms. C1, C2, C3, C4 and
C5 represents the handover requests made by the mobile phones from the
cars of the same name. Choose the correctly arranged queue.
Answer
ANSWERS
1. Answer : B
2. ANSWER :
For further reading :
3. Answer : D
Topic : Multiple Access Systems
5. ANSWER : A
Topic : PCN phones
Both GSM and PCN are digital mobile systems. The system used in North
America is the PCS - personal communication system, not PCN - personal
communication network. The difference is answer A - the frequency range.
6. Answer :D
Topic : What is a Cellular Network? AND Allowing Mobility of the
Subscriber
III is incorrect
ESN is the number assigned to the mobile phone by the manufacturer. The
statement IV actually refers to the Mobile Identification Number(MIN).
7. Answer : C
8. Answer : D
The problem described above is co-channel interference.
I is incorrect
The mobile phone transmits MIN when it enters a new cell for registration
purposes. This does not solve co-channel interference.
II is correct
The explanation below shows how SAT can be used to distinguish the correct
user from other users who are using the same channel frequency.
Diagram 1
As shown in the diagram on
the left, each cluster is
assigned SAT at different
frequencies. There are three
different frequencies. They
are 5970Hz(SAT
1),6000Hz(SAT 2) and
6030Hz(SAT 3).
The base station of a cell would first send this SAT to the mobile phone when
it enters this cell. After the mobile phone receives this SAT, it would re-
transmit this SAT almost continuously to the base station. So any co-channel
interference would be sensed as it would carry the wrong SAT frequency. In
this case the unknown person's mobile phone would be transmitting the
wrong SAT to Grommit's current base station. The base station can then
mute the unknown user's conversation.
III is correct
Cells using the same channel frequency would be located in different
clusters. So, increasing the size of the clusters would cause these cells using
the same channel frequency to be further away from each other. Therefore
co-channel interference is reduced.
III is not an extremely accurate answer unlike II, but it is an acceptable
answer owing to the fact that cluster size plays a major role in the degree of
co-channel interference in both analogue and digital cellular networks.
IV is incorrect
Increasing the bandwidth can only make matters worst as it reduces the
number of different channel frequencies. So, the same channel frequency
would be re-used in cells that are closer together.
9. Answer : A
GSM uses time division multiple access since code division multiple access
was not approved at the time GSM emerged.
CDMA is supposed to give better long distance transmission quality. Europe
consists of many small countries. The need to communicate with a user in
another country from one country is not high. This is because phone users in
different countries generally
ARTICLE 2. Mobile Phones in the UK and Multiple Access Systems -> The
CDMA cellular standard
10. Answer : D
Topic : Spread Spectrum
Spread spectrum uses a wide frequency band and allocates all resources to
all simultaneous users, controlling the power transmitted by each to a
minimum required to maintain a signal-to-noise ratio for the required level
of performance. In this way a simple receiver will pass the signal as
background noise.
12. Answer : B
I is incorrect
Let's say cell A and cell B are adjacent to each other.
After a channel frequency in cell A is borrowed to cell B, cell A cannot use
this channel frequency. This avoids co-channel interference.
II is correct
From the diagram it can be seen that the cell using the a4 channel is closer
to the cells marked N after the borrowing had occurred. Now, more cells
around the cells marked X would be unable to use the a4 channel in order to
prevent co-channel interference. So, cells marked N are possibly the cells
that are not allowed to use the a4 channel after borrowing had occurred.
III is incorrect
Borrowing is meant to increase the efficiency of spectrum utilisation and
does not affect the handover rate.
IV is incorrect
There is no reason for poorer voice reception as there is no increase in co-
channel interference or other related problems after borrowing occurs.
The handover threshold is set at the point where the power received from a
neighbouring cell site has started to exceed the power received from
the current BS for certain amount and/or for a certain time.
The receiver threshold is the point at which the received power from
the BS is at the minimum acceptable level.
A main requirement here in order to prevent forced termination of a call is
that :-
If queuing of handover request is done within the time interval (t1 - t0), the
above mentioned condition will be satisfied. This is why queuing of handover
request is possible.
For further reading :
14. Answer : C
Topic : Schemes to Minimise Forced Termination of a Call
Step 2.
Calculate the distance the car would have travelled away from the handover
threshold at 100ms This is done for each car by using the formula :-
Step 3.
Construct the table shown below.
Since it is assumed that the handover area is divided into infinite power level
ratios, a small difference in distance between the cars(from the table it can be
seen that this difference is as low as 0.18m) would be noticed by the system
and this would result in sorting of the queue. So, a car(e.g. C3) that is
slightly further away from another car(e.g. C2) would be assigned a higher
priority.
Wireless Communication
Q6. The coverage & capacity of CDMA system is more than that of GSM system
a). True
b). False
c). Equal
d). None of the above
Q7. The type of Access technology which can enhance the battery life is
a). CDMA
b). TDMA
c). OFDMA
d). None of the above
Q13. The process of channel coding, Encryption, Multiplexing and modulation for Trans
direction and reverse for reception are to be carried out by
a). BTS
b). BSC
c). MS
d). None of the above
Q14. The terminal is under observation from the network for the possible problems. Under
which list will this belong in EIR
a). White List
b). Grey List
c). Black List
d). None of the above
Q18. Which of these block processes CDMA channels, and performs digital and analogue
signal processing for IS-95A calls of each channel and interface with the RF block.
a). BHI
b). CCB
c). TCP
d). None of the above
a) If the channels in each cell are allocated to the users within the cell, it will be called as
fixed channel assignment. If all channels are occupied, the call Will be blocked.
b If the channels in each cell are allocated to the users within the cell, it will be called as
fixed channel assignment. If all channels are occupied, the call Will not be blocked.
c). a & b
d). None of the above
(a) If the voice channels are not allocated permanently in a cell, it will be called as
dynamic channel assignment. In this assignment, channels are dynamically allocated to
users by the MSC.
b). If the voice channels are allocated permanently in a cell, it will be called as dynamic
channel assignment. In this assignment, channels are dynamically allocated to users by the
MSC.
c). a & b
d). None of the above
b). When a mobile moves into a different cell while conversation in progress, the MSC
automatically transfers the call from one cell to other cell with interference. This is called as
hand off.
c). a & b
d). None of the above
1. IEEE has defined the specifications for a wireless LAN, called _______, which covers the
physical and data link layers.
A) IEEE 802.3
B) IEEE 802.5
C) IEEE 802.11
D) IEEE 802.2
2. In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and an optional central
base station, known as the access point (AP).
A) ESS
B) BSS
C) CSS
D) none of the above
A) an ad hoc architecture
B) an infrastructure
A) an ad hoc architecture
B) an infrastructure network
C) either (a) or (b)
D) neither (a) nor (b)
5. In IEEE 802.11, communication between two stations in two different BSSs usually occurs via
two ________.
A) BSSs
B) ESSs
C) APs
D) none of the above
6. In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or
moving only inside a BSS.
A) no-transition
B) BSS-transition
C) ESS-transition
D) none of the above
7. In IEEE 802.11, a station with ________mobility can move from one BSS to another, but the
movement is confined inside one ESS.
A) no-transition
B) BSS-transition
C) ESS-transition
D) none of the above
8. In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
A) no-transition
B) BSS-transition
C) ESS-transition
A) DCF
B) PCF
C) either (a) or (b)
D) neither (a) nor (b)
10. In IEEE 802.11, when a frame is going from one station in a BSS to another without passing
through the distribution system, the address flag is _____
A) 00
B) 01
C) 10
D) 11
11. In IEEE 802.11, when a frame is coming from an AP and going to a station, the address flag
is _______.
A) 00
B) 01
C) 10
D) 11
12. In IEEE 802.11, when a frame is going from a station to an AP, the address flag is _____.
A) 00
B) 01
C) 10
D) 11
13. In IEEE 802.11, when a frame is going from one AP to another AP in a wireless distribution
system, the address flag is _____
A) 00
B) 01
C) 10
D) 11
14. The IEEE 802.11 standard for wireless LANs defines two services: ______ and _______.
A) BSS; ASS
B) ESS; SSS
C) BSS; ESS
D) BSS; DCF
15. In IEEE 802.11, the access method used in the DCF sublayer is _________.
A) ALOHA
B) CSMA/CA
C) CSMA/CD
D) none of the above
16. In IEEE 802.11, the access method used in the PCF sublayer is ______.
A) contention
B) controlled
C) polling
D) none of
the above
17. In IEEE 802.11, the ______ is a timer used for collision avoidance.
A) NAV
B) BSS
C) ESS
D) none of the above
18. In IEEE 802.11, the MAC layer frame has ______
fields. A) four
B) five
C) six
______addresses. A) four
B) five
C) six
A) FHSS
B) DSSS
C) OFDM
D) either (a) or (b)
A) FHSS
B) DSSS
C) OFDM
A) FHSS
B) DSSS
C) OFDM
A) FHSS
B) DSSS
C) OFDM
_____Mbps. A) 1
B) 6
C) 11
D) 22
A) 1
B) 2
C) 6
_____Mbps. A) 1
B) 2
C) 5.5
_____Mbps. A) 1
B) 2
C) 11
D) 22
28. The IEEE 802.11 wireless LANs use ________ types of frames.
A) four
B) five
C) six
29. Bluetooth is a _______ technology that connects devices (called gadgets) in a small
B) wireless LAN
C) VLAN
A) piconet
B) scatternet
C) bluenet
B) piconets: scatternet
C) piconets: bluenet
D) bluenet; scatternet
32. A Bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.
A) one; five
B) five; three
C) two; six
D) one; seven
33. The RTS and CTS frames in CSMA/CA ____ solve the hidden station problem. The RTS
and CTS frames in CSMA/CA ____ solve the exposed station problem.
A) can; cannot
B) cannot; can
C) can; can
D) cannot; cannot
____Mbps A) 2
B) 5
C) 11
35. In Bluetooth, the _______ layer is roughly equivalent to the physical layer of the
Internet model.
A) radio
B) baseband
C) L2CAP
LANs. A) radio
B) baseband
C) L2CAP
37. In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in LANs.
A) radio
B) baseband
C) L2CAP
A) FDMA
B) TDD-TDMA
C) CDMA
D) none of the above
39. In Bluetooth, the _____ link is used when avoiding latency (delay in data delivery) is
more important than integrity (error-free delivery).
A) SCO
B) ACL
C) ACO
D) SCL
40. In Bluetooth, the _____ link is used when data integrity is more important than
avoiding latency.
A) SCO
B) ACL
C) ACO
D) SCL
41. Bluetooth uses ______method in the physical layer to avoid interference from other
devices or other networks.
A) DSSS
B) FHSS
C) FDMA
D) none of the above
43. The terms “data” and “information” mean the same thing.
(a) True
(b) False
(c) Same
(d) None of these
A.2.4Gbps B.5Gbps
C.2.4GHz D.5GHz
2. What is the maximum distance running the lowest data rate for 802.11b?
3. What is the maximum distance with maximum data rate for 802.11a?
A.LWAPP B.AWPP
C.STP D.IEEE
1. The sharing of a medium and its link by two or more devices is called _______.
(a) modulation
(b) encoding
(c) line disciple
(d) multiplexing
(a) FDM
(b) TDM
(c) WDM
(d) a&c
(a). 0
(b). 1
(c). 10
(d). infinity
(a). zero
(b). one
(c). ten
(d). infinity
3. _______ cable consists of an inner copper core and a second conducting outer
Sheath.
A) Twisted-pair
B) Coaxial
C) Fiber-optic
D) Shielded twisted-pair
7. What is the major factor that makes coaxial cable less susceptible to noise than?
Twisted-pair cable?
A) Inner conductor
B) Diameter of cable
C) Outer conductor
D) Insulating material
10. When a beam of light travels through media of two different densities, if the angle
of Incidence is greater than the critical angle, _______ occurs.
A) Reflection
B) Refraction
C) Incidence
D) Criticism
11. When the angle of incidence is _______ the critical angle, the light beam bends
along The interface.
A) More than
B) Less than
C) Equal to
D) None of the above
13. Signals with a frequency between 2 MHz and 30 MHz use ______ propagation.
A) Ground
B) Sky
C) line-of-sight
D) None of the above
16. A (n) _____ medium provides a physical conduit from one device to another.
A) Guided
B) Unguided
C) Either (a) or (b)
D) None of the above
17. ________ cable consists of two insulated copper wires twisted together.
A) Coaxial
B) Fiber-optic
C) Twisted-pair
D) None of the above
20. _____ cable can carry signals of higher frequency ranges than _____
cable. A) Twisted-pair; fiber-optic
B) Coaxial; fiber-optic
C) Coaxial; twisted-pair
D) None of the above
21. ______ cables are composed of a glass or plastic inner core surrounded by
cladding, All encased in an outside jacket.
A) Coaxial B)
Fiber-optic C)
Twisted-pair
D) None of the above
23. In a fiber-optic cable, the signal is propagated along the inner core by _______.
A) Reflection
B) Refraction
C) Modulation
D) None of the above
24. _________ media transport electromagnetic waves without the use of a
physical Conductor.
A) Guided
B) Unguided
C) Either (a) or (b)
D) None of the above
27. _______ is used for cellular phone, satellite, and wireless LAN communications.
A) Radio waves
B) Microwaves
C) Infrared waves
D) None of the above
28. ________ are used for short-range communications such as those between a PC
and A peripheral device.
A) Radio waves
B) Microwaves
C) Infrared waves
D) None of the above
1. Location Area is an area covered by ______.
(a). BTS
(b). BSC
(c) MSC
(d). Operator
4. GSM uses linear predictive coding (LPC). The purpose of LPC is to ____________ the bit rate
(a). reduce
(b). increase
(c). maintain
(d). None of the above
Q1. In free space transmission, the signal attenuation increases
Q2. When transmitting over a perfectly reflecting, smooth, plane earth, the path loss tends
to increase
Q3. Consider a cellular operator, who must select an appropriate frequency reuse distance. If
radio propagation attenuation increases rapidly with distance, his cellular systems will be
Q4. Consider propagation over a perfectly reflecting, smooth, plane earth. Doubling the
antenna height of a mobile receiver near the cell boundary
Q6. If reflected waves arrive with uniformly distributed angles of arrival, the Doppler spectrum,
Q12. The cluster size of the frequency reuse pattern of a hexagonal cellular system can only
take on a particular values. Namely
(a) 1,3,5,7,9,...
(b) 1,4,9,16,25,..
(c) 1,3,4,7,9,11,...
(d) 1,3,4,6,7,9,10,..
(a) with the square root of the cluster size
(b) proportional to cluster size
(c) with the square of the cluster size
(d) with the logarithm of the cluster size
Q14. propagation phenomena as experienced in wireless communication tend to improve
the stability of an ALOHA random access method
(a) True
(b) False
(c) same
(d) none of these
Q15. In a packet data transmission system with Rayleigh fading, error correction coding is more
critical in a system
(a) with short packet duration compared to the average fade duration
(b) with long packet duration compared to the average fade duration
(c) with short packet duration compared to the mean fade duration
(d) none of these
Q16. In an analog narrowband-FM cellular network, an operator can choose between a transmit
bandwidth of 12.5 or 25 kHz. Which bandwidth would you choose, if spectrum efficiency is
your prime concern?
(a) 12.5 kHz, because the system can accomodate twice as many channels per MHz of system
bandwidth
(b) 25 kHz, because it allows much denser frequency reuse than with 12.5 kHz.
(c) 25 kHz, because it allows much denser frequency reuse than with 125.5 kHz.
(d) none of these
Q17. The IS 95 Cellular CDMA uses the following spreading code in the downlink:
a. Interfaces
b. Protocols
c. Applications
d. Procedures
2. Power consumption level changes when a Bluetooth device is in different states. Which
of the following options represents the incremental trend of power consumption among
all possible states?
(a) Standby Park Sniff Hold Active
(b) Standby Sniff Park Hold Active
(c) Standby Park Hold Sniff Active
(d) Standby Hold Park Sniff Active
a. Baseband
b. SDP
c. L2CAP
d. LMP
e. RFCOM
a. Bluetooth
b. Hiperlan
c. i-Fi
d. IrDA
e. HomeRF
a. Short range
b. Low power
c. Low cost
d. Small networks
e. All of the above
7. HCI is one of the Bluetooth transport protocols
(a) False
(b) true
(c) same
(d) none of these
(a) False
(b) true
(c) same
(d) none of these
A) pure ALOHA
B) slotted ALOHA
C) both (a) and (b)
D) neither (a) nor (b)
2. In pure ALOHA, the vulnerable time is ______ the frame transmission time.
A) the same as
B) two times
C) three times
D) none of the above
3. The maximum throughput for pure ALOHA is ________ per cent.
A) 12.2
B) 18.4
C) 36.8
D) none of the above
4. In __________, each station is forced to send only at the beginning of the time slot.
A) pure ALOHA
B) slotted ALOHA
C) both (a) and (b)
D) neither (a) nor (b)
5. In slotted ALOHA, the vulnerable time is ______ the frame transmission time.
A) the same as
B) two times
C) three times
D) none of the above
A) 12.2
B) 18.4
C) 36.8
D) none of the above
7. The vulnerable time for CSMA is the ________propagation time.
A) the same as
B) two times
C) three times
D) none of the above
8. In the _________ method, after the station finds the line idle, it sends its frame
immediately. If the line is not idle, it continuously senses the line until it finds it idle.
A) nonpersistent
B) 1-persistent
C) p-persistent
D) none of the above
9. In the ________method, a station that has a frame to send senses the line. If the line is
idle, it sends immediately. If the line is not idle, it waits a random amount of time and then
senses the line again.
A) nonpersistent
B) 1-persistent
C) p-persistent
D) none of the above
10 In the _______method, after the station finds the line idle it sends or refrain from sending
based on the outcome of a random number generator. If the line is busy, it tries again.
A) nonpersistent
B) 1-persistent
C) p-persistent
D) none of the above
11. We have categorized access methods into _______ groups.
A) two
B) three
C) four
D) five
12. In ___________ methods, no station is superior to another station and none is assigned
the control over another.
A) random access
B) controlled access
C) channelization
D) none of the above
13. In ______, the chance of collision can be reduced if a station senses the medium before
trying to use it.
A) MA
B) CSMA
C) FDMA
D) CDMA
14. ________ requires that each station first listen to the medium before sending.
A) MA
B) CSMA
C) FDMA
D) CDMA
15. __________ augments the CSMA algorithm to detect collision.
A) CSMA/CA
B) CSMA/CD
C) either (a) or (b)
D) both (a) and (b)
16. In ________, a station monitors the medium after it sends a frame to see if the
transmission was successful. If so, the station is finished. If, however, there is a collision, the
frame is sent again.
A) CSMA/CA
B) CSMA/CD
C) either (a) or (b)
D) both (a) and (b)
17. To avoid collisions on wireless networks, ________was invented.
A) CSMA/CA
B) CSMA/CD
C) either (a) or (b)
D) both (a) and (b)
18. In _______, collisions are avoided through the use of three strategies: the interframe
space, the contention window, and acknowledgments.
A) CSMA/CA
B) CSMA/CD
C) either (a) or (b)
D) both (a) and (b)
19. In _______ methods, the stations consult one another to find which station has the right
to send.
A) random access
B) controlled access
C) channelization
D) none of the above
20. In _______ methods, a station cannot send unless it has been authorized by other
stations.
A) random access
B) controlled access
C) channelization
D) none of the above
21. We discussed ______ popular controlled-access methods.
A) two
B) three
C) four
D) none of the above
22. In the ________ method, a station needs to make a reservation before sending data. Time
is divided into intervals.
A) reservation
B) polling
C) token passing
D) none of the above
23. In the _____ method, time is divided into intervals. In each interval, a reservation frame
precedes the data frames sent in that interval.
A) reservation
B) polling
C) token passing
D) none of the above
24. In the ______ method, all data exchanges must be made through the primary device even
when the ultimate destination is a secondary device.
A) reservation
B) polling
C) token passing
D) none of the above
25. In the _______ method, the primary device controls the link; the secondary devices
follow its instructions.
A) reservation
B) polling
C) token passing
D) none of the above
26. In the _______ method, the stations in a network are organized in a logical ring.
A) reservation
B) polling
C) token passing
D) none of the above
27. In the _______ method, each station has a predecessor and a successor.
A) reservation
B) polling
C) token passing
D) none of the above
28. In the _________ method, a special packet called a ______ circulates through the ring.
A) Random access
B) Controlled access
C) Channelization
D) none of the above
30. We discussed ________ channelization protocols.
A) two
B) three
C) four
D) none of the above
31. In ________, the available bandwidth is divided into frequency bands.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
32. In ______, each station is allocated a band to send its data. In other words, each band is
reserved for a specific station, and it belongs to the station all the time.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
33. In _______, the stations share the bandwidth of the channel in time.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
34. In _____, each station is allocated a time slot during which it can send data. Each station
transmits its data in its assigned time slot.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
35. In _____, each station transmits its data in its assigned time slot.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
36. In ______, the stations use different codes to achieve multiple access.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
37. _______ is based on coding theory and uses sequences of numbers called chips.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
38. In _______, the sequences are generated using orthogonal codes such the Walsh tables.
A) FDMA
B) TDMA
C) CDMA
D) none of the above
A) FDM
B) TDM
C) WDM
D) None of the above
A) FDM
B) TDM
3. In synchronous TDM, for n signal sources of the same data rate, each frame contains _______ slots.
A) n
B) n+1
C) n-1
D) 0 to n
4. In TDM, the transmission rate of the multiplexed path is usually _______ the sum of the transmission
rates of the signal sources.
A) greater than
B) less than
C) equal to
D) not related to
A) FDM
B) TDM
C) WDM
A) Frequency
B) Bandwidth
C) Amplitude
7. ________ can be achieved by using multiplexing; ______ can be achieved by using spreading.
8.________ is the set of techniques that allows the simultaneous transmission of multiple signals across
a single data link.
A) Demodulating
B) Multiplexing
C) Compressing
A) 1; n
B) 1; 1
C) n; 1
D) n; n
10. The word ______ refers to the portion of a _______ that carries a transmission.
A) channel; link
B) link; channel
C) line; channel
D) line; link
11. ______ can be applied when the bandwidth of a link (in hertz) is greater than the
combined bandwidths of the signals to be transmitted.
A) TDM
B) FDM
A) analog
B) digital
13. ____ is designed to use the high bandwidth capability of fiber-optic cable.
A) FDM
B) TDM
C) WDM
A) FDM
B) TDM
C) WDM
15____ is a digital process that allows several connections to share the high bandwidth of a link.
A) FDM
B) TDM
C) WDM
16_____ is a digital multiplexing technique for combining several low-rate channels into one high-rate
one.
A) FDM
B) TDM
C) WDM
17. We can divide ____ into two different schemes: synchronous or statistical.
A) FDM
B) TDM
C) WDM
18. In ________ TDM, each input connection has an allotment in the output even if it is not
sending data.
A) synchronous
B) statistical
C) isochronous
19. In ________ TDM, slots are dynamically allocated to improve bandwidth efficiency.
A) synchronous
B) statistical
C) isochronous
20. In ________, we combine signals from different sources to fit into a larger bandwidth.
A) spread spectrum
B) line coding
C) block coding
21. _______ is designed to be used in wireless applications in which stations must be able to share the
medium without interception by an eavesdropper and without being subject to jamming from a
malicious intruder.
A) Spread spectrum
B) Multiplexing
C) Modulation
22. The _______ technique uses M different carrier frequencies that are modulated by the source signal.
At one moment, the sign modulates one carrier frequency; at the next moment, the signal modulates
another carrier frequency.
A) FDM
B) DSSS
C) FHSS
D) TDM
23. The ______ technique expands the bandwidth of a signal by replacing each data bit with n bits.
A) FDM
B) DSSS
C) FHS
D) TDM
A) AMPS
B) D-AMPS
C) GSM
A) AMPS
B) D-AMPS
C) GSM
A) GSM
B) D-AMPS
C) IS-95
A) GSM
B) D-AMPS
C) IS-95
A) GSM
B) D-AMPS
C) IS-95
29. The __________ cellular phone system will provide universal personal communication.
A) first-generation
B) second-generation
C) third-generation
A) hard
B) soft
C) medium
31. In a ______ handoff, a mobile station can communicate with two base stations at the same time.
A) hard
B) soft
C) medium
A) AMPS
B) D-AMPS
C) GSM
A) 800-MHz
B) 900-MHz
C) 1800-MHz
A) 800
B) 900
C) 1000
A) 1
B) 3
C) 5
D) 7
36. AMPS uses ______ to divide each 25-MHz band into channels.
A) FDMA
B) TDMA
C) CDMA
37. D-AMPS uses ______ to divide each 25-MHz band into channels.
A) FDMA
B) TDMA
C) CDMA
A) 1
B) 3
C) 5
D) 7
A) FDMA
B) TDMA
C) CDMA
A) FDMA
B) CDMA
C) DSSS
A) 800-MHz
B) 900-MHz
C) 1900-MHz
A) GPS
B) Teledesic
C) Iridium
A) 1
B) 3
C) 5
D) 7
A) IMT-DS
B) IMT-MC
C) IMT-TC
D) IMT-SC
45. In the third generation of cellular phones, ________ uses CDMA2000.
A) IMT-DS
B) IMT-MC
C) IMT-TC
D) IMT-SC
46. In the third generation of cellular phones, ______ uses a combination of W-CDMA and TDMA.
A) IMT-DS
B) IMT-MC
C) IMT-TC
D) IMT-SC
A) IMT-DS
B) IMT-MC
C) IMT-TC
D) IMT-SC
(a) 0.8us
(b) 2.4us
(c) 3.2us
(d) 4us
3. The coding scheme used in 802.11a specifications is
(a) 52
(b) 64
(c) 48
(d) 24
(a) BPSK
(c) QPSK
(d) 64QAM
(a) 2
(b) 3
(c) 8
(d) 10
(a) 3.2us
(b) 4us
(c) 8us
(d) 10us
(a) 6
(b) 9
(c) 12
(d) 18
10. The transmitter center frequency tolerance in 802.11a specification is
(a) +/-10 ppm
(b) In CDMA system, BSC selects received signals from a variety of base stations with the help
of software.
(c) In GSM system, MSC selects received signals from a variety of base stations with the help of
software. This is called as soft handoff.
(a) The interference between the signals from co channel cells is called as co cannel interference.
(b) In CDMA system, BSC selects received signals from a variety of base stations with the help
of software.
(c) The interference between the signals from channel cells is called as co cannel interference.
(a) The interference between the signals from co channel cells is called as co cannel interference.
(b) It is define as the ratio between the distance between the centers of nearest co channel
cells to the radius of the cell. Q = D/R
(c) The interference between the signals from channel cells is called as co cannel interference.
(a) The interference between the signals from co channel cells is called as co cannel interference.
(b) Interference resulting from signals which are adjacent in frequency to the desired signal is
called adjacent channel interference.
(c) The interference between the signals from channel cells is called as co cannel interference.
(a) In a system, a user is blocked without access by a system when no channels are available in
the system. The call blocked by the system is cleared and the user should try again. This is called
BCC system.
(b) It is defined as the measure of the ability of a user to access a trunked system during the
busiest hour.
(a) If a channel is not available immediately, the call request may be delayed until a channel
becomes available.
(b) It is defined as the measure of the ability of a user to access a trunked system during the
busiest hour.
(a) If a channel is not available immediately, the call request may be delayed until a channel
becomes available.
(b) Cell splitting is the process of subdividing congested cells into smaller cells each with its own
base stations and a corresponding reduction in antenna height and transmitter power. It increases
the capacity of cellular system.
(a) If a channel is not available immediately, the call request may be delayed until a channel
becomes available.
(b) Sectoring s a technique for decreasing co-channel interference and thus increasing the
system performance by using directional antennas.
(a) If a channel is not available immediately, the call request may be delayed until a channel
becomes available.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(a) If a channel is not available immediately, the call request may be delayed until a channel
becomes available.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(c) The propagation models that characterize the signal strength over large T -R
separation distances (several hundreds or thousands of meters.
(a) If a channel is not available immediately, the call request may be delayed until a channel
becomes available.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(c) The propagation models that characterize the rapid fluctuations of the received signal strength
over very short travel distances (a few wavelengths) or short time duration.
(a) The free space propagation model is used to predict received signal strength, when
unobstructed line-of-sight path between transmitter & receiver.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(c) The propagation models that characterize the rapid fluctuations of the received signal strength
over very short travel distances (a few wavelengths) or short time duration.
(a) The free space propagation model is used to predict received signal strength, when
unobstructed line-of-sight path between transmitter & receiver.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(c) The path loss is defined as the difference(in dB) between the effective transmitted power &
the received power, &may or may not include the effect of the antenna gains.
(a) The free space propagation model is used to predict received signal strength, when
unobstructed line-of-sight path between transmitter & receiver.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(c) When a radio wave impinges on a rough surface , the reflected energy is spread out in all
directions due to scattering.
(d) None of these
(a) Small scale fading is used to describe the rapid fluctuations of the amplitudes, phases, or
multipath delays of a radio signal over a short period of time or travel distance.
(b) Propagation models that predict the mean signal strength for an arbitrary transmitter –
receiver separation distance are useful in estimating the radio coverage area of a transmitter.
(c) When a radio wave impinges on a rough surface , the reflected energy is spread out in all
directions due to scattering.
(a) If the mobile radio channel has a constant gain & linear phase response over a bandwidth
which is greater than the bandwidth of the transmitted signal, then the received signal will
undergo flat fading.
(b) Multipath propagation
(c) The shift in received signal frequency due to motion is called the Doppler shift.
(d) None of these
Q20. What is frequency selective fading?
(a) If the mobile radio channel has a constant gain & linear phase response over a bandwidth
which is greater than the bandwidth of the transmitted signal, then the received signal will
undergo flat fading.
(b) If the channel possesses a constant gain & linear phase response over a bandwidth that is
smaller than the bandwidth of the transmitted signal, then the channel creates frequency selective
fading on the received signal.
(c) The shift in received signal frequency due to motion is called the Doppler shift.
(d) None of these
(a) If the mobile radio channel has a constant gain & linear phase response over a bandwidth
which is greater than the bandwidth of the transmitted signal, then the received signal will
undergo flat fading.
(b) The channel impulse response changes rapidly within the symbol duration. This type of a
channel is called fast fading channel.
(c) The shift in received signal frequency due to motion is called the Doppler shift.
(d) None of these
(a) The channel impulse response changes at a rate much slower than the transmitted baseband
signal. This type of a channel is called slow fading channel.
(b) The channel impulse response changes rapidly within the symbol duration. This type of a
channel is called fast fading channel.
(c) The shift in received signal frequency due to motion is called the Doppler shift.
(d) None of these
(a) Multiple access schemes are used to allow many mobile users to share simultaneously a finite
amount of radio spectrum. It is required to achieve high capacity by simultaneously allocating
the bandwidth to multiple users.
(b) The channel impulse response changes rapidly within the symbol duration. This type of a
channel is called fast fading channel.
(c) The shift in received signal frequency due to motion is called the Doppler shift.
(d) None of these
Q24. What is frequency division duplexing?
(a) It is duplexing done using frequency techniques.FDD provides two distinct bands of
frequencies for every user. The forward band provides traffic from the base station to the mobile,
and the reverse band provides traffic from the mobile to the base station.
(b) The channel impulse response changes rapidly within the symbol duration. This type of a
channel is called fast fading channel.
(c) The shift in received signal frequency due to motion is called the Doppler shift.
(d) None of these
Q25. What are the multiple access techniques?
(a) In wideband system, the transmission bandwidth of a single channel is much larger than the
coherence bandwidth of the channel. Thus multipath fading does not greatly vary the received
signal power within a wideband channel.
(a) In FDMA, many channels share the same antenna at the base station. The powers amplifiers
are nonlinear which causes signal spreading in the frequency domain and generate inter
modulation frequencies. It is undesirable and can result in interference.
(b) Time division multiple access
(c) Code division multiple access
(d) None of these
Q28. What is time division multiple access?
(a) Time division multiple access systems divide the radio spectrum into time slots and in each
slot only one user is allowed to either transmit or receive.
(b) Time division multiple access
(c) Code division multiple access
(d) None of these
(a) If the rate of change of the carrier frequency is greater than the symbol rate, then the system
is referred to as fast frequency hopping. If the rate of change of the carrier frequency is lesser
than the symbol rate, then the system is referred to as slow frequency hopping.
(a) It can be defined as the maximum number of channels or users that can be provided in a fixed
frequency band.
(b) Time division multiple access
(c) Code division multiple access
(d) None of these
Q31. Define forward channel interference
(a) It can be defined as the maximum number of channels or users that can be provided in a fixed
frequency band.
(b) For a particular subscriber until, the desired base station will provide the desired forward
channel while the surrounding co-channel base stations will provide the forward channel
interference.
(c) Code division multiple access
(d) None of these
Q32. Define adaptive channel allocation
(a) It can be defined as the maximum number of channels or users that can be provided in a fixed
frequency band.
(b) Adaptive channel allocation in TDMA eliminates system planning since it is not required to
plan frequencies for cells.
(c) Code division multiple access
(d) None of these
Q33. State some of the features of CDMA
(a) The efficiency of a TDMA is a measure of the percentage of transmitted data that contains
information as opposed to providing overhead for the access scheme.
(b) CDMA has soft capacity limit.
(c) Multipath fading may be substantially reduced
(d) None of these
(a) TDMA shares a single carrier frequency with several users, where each user makes use of
non overlapping time slots.
(b) Data transmission occurs in bursts.
(c) Handoff process is much simpler
(d) All of these
(a) Duplexers are not required, since transmission and reception occurs at different time slots.
(b) Data transmission occurs in bursts.
(c) Handoff process is much simpler
(d) All of these
(a) TDD uses time instead of frequency to provide both a forward and reverse link.
Multiple users share a single radio channel by taking turns in the time domain.
(b) Data transmission occurs in bursts.
(c) Handoff process is much simpler
(d) None of these
(a) The NSS managing the switching function of the systems and allows the MSCs to
communicate with other networks such as PSTN and ISDN.
(b) Bearer or Data services
(c) Supplementary services
(d) None of these
(a) Dummy burst is used as filter information for unused time slots on the forward link.
(b) Half-rate TCH
(c) The guard period is used to avoid overlapping with other bursts due to different path delays
and to give the transmitter time to turn on and off.
(d) None of these
(a) Dummy burst is used as filter information for unused time slots on the forward link.
(b) Burst formatting adds binary data to the ciphered blocks, in order to help synchronization and
equalization of the received signal.
(c) The guard period is used to avoid overlapping with other bursts due to different path delays
and to give the transmitter time to turn on and off.
(d) None of these
(a) Dummy burst is used as filter information for unused time slots on the forward link.
(b) Burst The pilot channel is intended to provide a reference signal for all MSS within a cell
provides the phase reference for coherent demodulation.
(c) The guard period is used to avoid overlapping with other bursts due to different path delays
and to give the transmitter time to turn on and off.
(d) None of these
(a) The simplest Bluetooth networks called piconet can have from two to eight nodes. Piconet
is a collection of Bluetooth devices which are synchronized to the same hopping sequence.
(b) Burst The pilot channel is intended to provide a reference signal for all MSS within a cell
provides the phase reference for coherent demodulation.
(c) The guard period is used to avoid overlapping with other bursts due to different path delays
and to give the transmitter time to turn on and off.
(d) None of these
(a) The simplest Bluetooth networks called piconet can have from two to eight nodes. Piconet is
a collection of Bluetooth devices which are synchronized to the same hopping sequence.
(b) One Bluetooth devices can operate simultaneously on two piconet acting as a bridge between
the two.
(c) The guard period is used to avoid overlapping with other bursts due to different path delays
and to give the transmitter time to turn on and off.
(d) None of these
54. What is T1 data rate?
(a) 1 dn (b) 1 dn
R dh R dh
dn
(c) R (d) None of these
dh
(a) Elimination of the multipath reception (b) Introduce of the multipath reception