Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

Ajay Kumar Garg Engineering College, Ghaziabad

Department of CSE

Multiple Choice Questions

Subject Name/ Subject Code: Wireless Mobile Networks (MTCS-202)

Year/Semester: I/II

------------------------------------------------------------------------------------------------

UNIT I -Introduction to Wireless and Mobile Networks & Wireless


Transmission
Q1. Paging system uses which mode of transmission?
a) Full duplex
b) Simplex
c) Half Duplex
d) Duplex

Q2. The information sent by paging system is known as a ___________


a) Note
b) Line
c) Message
d) Page

Q3. Which type of message cannot be sent with the help of paging system?
a) Alphanumeric message
b) Video message
c) Voice message
d) Numeric message

Q4. What is a paging access number?


a) An e mail id
b) A username
c) A toll free telephone number
d) A registration number

Q5. Which type of transmission technique is employed by paging system?


a) Simulcasting
b) Multicasting
c) Unicasting
d) Hybrid
Q6. Which of the following is not the property of paging system?
a) Asymmetric communication
b) Light weight
c) High cost
d) Wide area coverage

Q7. Which of the following properties describes the transmitters and receivers in paging
system?

a) High complexity and high power transmitter, high complexity and high power receivers
b) Low complexity and low power transmitter, low complexity and low power receivers
c) Low complexity and low power transmitter, high complexity and high power receivers
d) High complexity and high power transmitter, low complexity and low power receivers

Q8. What is a pager in the paging system?


a) A transmitter
b) A receiver
c) A transceiver
d) An equalizer

Q9 Who introduced the paging system for the first time?


a) Al Gross
b) Teri Pall
c) Alexander Graham Bell
d) Martin Cooper

Q10. Which of the following is a protocol used for cordless telephone system?
a) PACS
b) ERMES
c) IS-95
d) FLEX

Q11. In which frequency range do the cordless phones mostly work?


a) 43-50 MHz
b) 88-108 MHz
c) 540-1600 KHz
d) 200-540 KHz

Q12. Which of the following is the drawback for cordless telephones?


a) Wireless technology
b) Limited coverage area
c) Mobile
d) Security
Q13. Which of the following is a fully digital cordless system?
a) CT0
b) CT1
c) CT1+
d) DECT

Q14. Which of the following is an example of local wireless system?


a) GSM
b) Cordless telephone system
c) UMTS
d) EDGE

Q15 Which of the following is not a standard for cordless telephony?


a) CT-2
b) DECT
c) UMTS
d) PHS

Q16. What is the range of cell diameter of DECT?


a) 300 m
b) 2 km
c) 10 km
d) 70 km

Q17. Cordless telephone system will not work under which of the following criteria?
a) Within a home
b) Within a building
c) Within campus
d) Within a city

Q18. Which of the following is not an application of DECT?


a) Multimedia processing
b) Cordless private branch exchange
c) Wireless local loop
d) Home cordless phones

Q19. Which of the following is not a characteristic of cellular telephone system?


a) Accommodate a large number of users
b) Large geographic area
c) Limited frequency spectrum
d) Large frequency spectrum

Q20 What is the responsibility of MSC in cellular telephone system?


a) Connection of mobile to base stations
b) Connection of mobile to PSTN
c) Connection of base station to PSTN
d) Connection of base station to MSC

Q21 Who has the responsibility of billing and system maintenance function in cellular
system?
a) Base Station
b) PSTN
c) MSC
d) Mobile system

Q22. What is the function of FVC (Forward Voice Channel)?


a) Voice transmission from base station to mobiles
b) Voice transmission from mobile to base station
c) Initiating mobile calls
d) Broadcast all traffic request for all mobile

Q23. Which two channels are responsible for initiating mobile calls?
a) FVC and FCC
b) FVC and RVC
c) FCC and RCC
d) FCC and RVC

Q24. Of the total channels present in the cellular system, what is the percentage of voice
and control channels?
a) 95% voice channels, 5% control channels
b) 5% voice channels, 95% control channels
c) 50% voice channels, 50% control channels
d) 25% voice channels, 75% control channels

Q25. What is MIN?


a) Subscriber’s telephone number
b) Paging message
c) Traffic request number
d) Mobile Internet

Q26. What is transmitted along with the call initiation request during the origin of call
by a mobile?
a) MIN
b) ESN
c) ESN and SCM
d) MIN, ESN and SCM

Q27. What does SCM indicates?


a) Maximum receiver power level for a particular user
b) Maximum transmitter power level for a particular user
c) Minimum receiver power level for a particular user
d) Minimum transmitter power level for a particular user

Q28. What is the shape of the cell present in the cellular system?
a) Circular
b) Square
c) Hexagonal
d) Triangular

Q29. Why the size of the cell is kept small in cellular network?
a) Increase capacity
b) Decrease capacity
c) Increased size of base station electronics
d) Slow process of handoffs

Q30. What is handoff?


a) Forward channel
b) Switching technique
c) Roamer
d) Guard channel

Q31. Which one is not an advantage of using frequency reuse?


a) Increased capacity
b) Limited spectrum is required
c) Same spectrum may be allocated to other network
d) Number of base stations is reduced

Q32. The process of transferring a mobile station from one base station to another is
____________
a) MSC
b) Roamer
c) Handoff
d) Forward channel

Q33. The interference between the neighbouring base stations is avoided by


____________
a) Assigning different group of channels
b) Using transmitters with different power level
c) Using different antennas
d) Using different base stations

Q34. Which statement is FALSE about wireless networks?


(A) Wireless networks are convenient
(B) Wireless networks are slower than wired LANs
(C) Wireless networks use radio transmitters.
(D) Wireless networks are faster than wired networks

Q35.What port is a fast connection that is more flexible than traditional serial and
parallel ports?
(A) Serial
(B) USB
(C) Parallel
(D) Ethernet

Q36. Broadband connections include all EXCEPT


(A) Cable modems
(B) DSL
(C) Wireless
(D) Phone modems

Q37. What type of cable uses light waves to carry information at high speed?
(A) Cable modems
(B) Fiber-optic cables
(C) Wireless cables
(D) Phone lines

Q38. Which type of media has the longest maximum distance?


(A) Twisted pair
(B) Wireless
(C) Coaxial cable
(D) Fiber-optic

Q39. Which of the following is a protocol used for cordless telephone system?
(A) PACS
(B) ERMES
(C) IS-95
(D) FLEX

Q40. Which of the following is a fully digital cordless system?


(A) CTO
(B) CT1
(C) CT1+
(D) DECT

Q41. What is the function of FVC (Forward Voice Channel)?


(A) Voice transmission from base station to mobiles
(B) Voice transmission from mobile to base station.
(C) Initiating mobile calls
(D) Broadcast all traffic request for all mobile

Q42. What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM
band?
(A) UNII
(B) Unlicensed PCS
(C) Millimetre wave
(D) Bluetooth

Q43. In fixed channel assignment strategy, each cell is allocated a predetermined set of
______
(A) Voice channels
(B) Control channels
(C) Frequency
(D) Base stations

Q44. What happen to a call-in fixed channel strategy, if all the channels in a cell are
occupied?
(A) Queued
(B) Cross talk.
(C) Blocked
(D) Delayed

Q45. What is a borrowing strategy in fixed channel assignment?


(A) Borrowing channels from neighbouring cell
(B) Borrowing channels from neighbouring cluster
(C) Borrowing channels from same cell
(D) Borrowing channels from other base station in same cell

Q46. In dynamic channel assignment strategy, base station requests channel from
________
(A) MSC
(B) Neighbouring cell
(C) Neighbouring cluster
(D) Neighbouring base station
Answer: A

Q47. RSSI stands for ____________


(A) Radio System Signal Indicator
(B) Restricted Signal Strength Indicator
(C) Radio Signal Strength Indication
(D) Restricted System Software Indicator

Q48. The interference between the neighbouring base stations is avoided by


____________
a) Assigning different group of channels
b) Using transmitters with different power level
c) Using different antennas
d) Using different base stations

Q49. Cellular concept replaces many low power transmitters to a single high power
transmitter.
a) True
b) False
Q50. HSCSD allows single users _____________in order to obtain higher speed data
access over the GSM network.
a) to use one specific time slot
b) to use consecutive user time slots
c) by using 8-PSK modulation technique
d) to use individual time slot
ANSWER KEY:

Unit-1

1. b Simplex
Explanation: Simplex systems communicate in only one way. For the paging
systems, messages received are not acknowledged and thus they use simplex mode
of transmission.
2. d Page
Explanation: Page is concise information sent by a paging system to the
subscribers of entire service area.
3. b Video message
Explanation: The message sent by a paging system can be numeric, alphanumeric
or voice depending upon the type of service.
4. c A toll free telephone number
Explanation: Paging access number is a telephone number which is used to send
the information to the subscriber.
5. a Simulcasting
Explanation: Simulcast is a reliable technique used by paging system by
transmitting the same paging signal from multiple paging transmitters at
approximately equal times.
6. c High cost
Explanation: One of the main reasons for the increased users of paging system was
its less cost. But as the prices of cellular system declined, the users of paging system
also decreased.
7. D High complexity and high power transmitter, low complexity and low power
receivers
Explanation: High power of transmitters helps paging signal to easily penetrate the
building and low power receivers allow long usage time and light weight batteries.
8. b A receiver
Explanation: A pager is a wireless device which receives the page, i.e. numeric,
alphanumeric or voice message sent by the transmitter.
9. a Al Gross
Explanation: AL Gross introduced the first paging system during world war in
1949.
10. a PACS
Explanation: PACS (Personal Access Communication System) is a protocol used
for cordless telephone system. ERMES and FLEX are used by paging system. And
IS-95 is used for cellular system.
11. a 43-50 MHz
Explanation: Cordless phones mostly operate in the frequency range of 43-50
MHz. The frequency range of FM is 88-108 MHz and for AM is 540-1600 KHz.
12. b Limited coverage area
Explanation: Cordless telephone systems are wireless, but they have a
disadvantage of limited coverage area with cell size of approx. 300 m. Being digital,
they have very less chance of eaves dropping.
13. d DECT
Explanation: Digital enhanced cordless telecommunication (DECT) is a fully
digital system established in 1991. CT0, Ct1, Ct1+ were analog systems established
in 1980, 1984 and 1987 respectively.
14. b. Cordless telephone system
Explanation: GSM, UMTS and EDGE covers worldwide area whereas cordless
system has vey less coverage area.
15. c UMTS
Explanation: CT-2 is a cordless telephone standard used in Europe and Asia. DECT
and PHS (Personal Handyphone System) are cordless telephone standards used in
Europe and Japan respectively. UMTS is a cellular system standard.
16. a. 300 m
Explanation: DECT has the cell diameter of 300 m from the base station while
GSM is designed for outdoor use with a cell diameter of 70 km.
17. d Within a city
Explanation: Cordless telephones are used in homes, in offices, on campus, at
trade shows. But due to their limited coverage they cannot cover a whole city.
18. a Multimedia processing
Explanation: Users in a neighborhood served by a telephone company wired local
loop can be connected by a cordless phone that exchanges signals with a
neighborhood antenna.
19. d Large frequency spectrum
Explanation: Cellular systems accommodate a large number of users within a
limited frequency spectrum over a large geographic area.
20. b Connection of mobile to PSTN
Explanation: Mobile Switching Center (MSC) is responsible for connecting all
mobiles to the PSTN (Public Switched Telephone Network) in a cellular system.
21. c MSC
Explanation: Mobile switching center (MSC) accommodates 100,000 subscribers
and 5,000 simultaneous conversations at a time and handles all billing and system
maintenance functions.
22. a Voice transmission from base station to mobiles
Explanation: FVC (Forward Voice Channel) and RVC (Reverse Voice Channel)
are responsible for voice transmission. FVC is used for voice transmission from
base station to mobile and RVC is used for voice transmission from mobile to base
station.
23. c FCC and RCC
Explanation: FCC (Forward Control Channel) and RCC (Reverse Control
Channel) are control channels responsible for initiating mobile calls.
24. a 95% voice channels, 5% control channels
Explanation: In each cellular system, control channels are 5% of the total
channels available and remaining 95% are dedicated to voice and data traffic.
25. a. Subscriber’s telephone number
Explanation: MIN (Mobile Identification Number) is a 10 digit unique number
which represents the telephone number of subscriber.
26. d. MIN, ESN and SCM
Explanation: When a mobile originates the call, it sends the MIN (mobile
identification number), ESN (electronic serial number) and SCM (station class
mark) along with the call initiation request.
27. b Maximum transmitter power level for a particular user
Explanation: SCM (Station Class Mark) indicates the maximum transmitter power
level for a particular user.
28. c Hexagonal
Explanation: The shape of the cell present in the cellular network is hexagonal
since it can cover the entire geographical area without any gap and overlapping.
29. a Increase capacity
Explanation: The size of the cells in cellular network is kept small because of the
need of high capacity in areas with high user density and reduced size and cost of
base station electronics.
30. b Switching technique
Explanation: Handoff is a switching technique which refers to the process of
transferring an active call or data session from one cell in a cellular network to
another.
31. d Number of base stations is reduced
Explanation: Frequency reuse is a technique of reusing frequencies and channels
within a cellular system to improve capacity and spectral efficiency.
32. c Handoff
Explanation: Handoff is the process of changing the channel associated with
current connection while a call is in progress.
33. a Assigning different group of channels
Explanation: The interference between the neighbouring base stations is avoided
by assigning different group of channels and reusing the same channel after a certain
amount of distance.

34. d Wireless networks are faster than wired networks


Explanation: Wired networks are generally much faster than wireless networks. This
is mainly because a separate cable is used to connect each device to the network with
each cable transmitting data at the same speed. A wired network is also faster since it
never is weighed down by unexpected or unnecessary traffic.
35. b. USB
Explanation: The Universal Serial Bus, or USB, is an external port that interfaces
between external devices and a computer. The original IBM personal computers had an
RS-232 port that connected external devices like a keyboard or mouse. Today, USB
ports are replacing RS-232 ports. One may plug most anything into a USB port. This
includes keyboards, cameras, mice, joysticks, modems, zip drives, floppy drives,
printers, and scanners.
USB offers three key advantages to peripheral manufacturers:
 Compatibility:
 Speed:
 Durability:
36. d Phone modems
37. b Fiber-optic cables
Explanation: Fiber-optic communication is a method of transmitting information from one
place to another by sending pulses of infrared light through an optical fiber. The light is
a form of carrier wave that is modulated to carry information.
38. c Coaxial cable
Explanation: Coaxial cable can be cabled over longer distances than twisted-pair cable.
For example, Ethernet can run approximately 100 meters (328 feet) using twisted-pair
cabling. Using coaxial cable increases this distance to 500m (1640.4 feet).

39. a PACS
Explanation: PACS (Personal Access Communication System) is a protocol used for
cordless telephone system. ERMES and FLEX are used by paging system. And IS-95 is
used for cellular system.
40. d DECT
Explanation: Digital enhanced cordless telecommunication (DECT) is a fully digital
system established in 1991. CT0, Ct1, Ct1+ were analog systems established in 1980, 1984
and 1987 respectively.
41. a Voice transmission from base station to mobiles
Explanation: FVC (Forward Voice Channel) and RVC (Reverse Voice Channel) are
responsible for voice transmission. FVC is used for voice transmission from
base station to mobile and RVC is used for voice transmission from mobile to base station.
42. a UNII
Explanation: FCC allocated 300 MHz of unlicensed spectrum in the ISM bands. This
allocation is called the Unlicensed National Information Infrastructure (UNII) band. It was
allocated for the express purpose of supporting low power license free spread spectrum
data communication.
43. a Voice channels
Explanation: In a foxed channel strategy, each cell is allocated a predetermined set of
voice channels. Any call attempt within the cell can only be served by the unused channels
in that particular cell.
44. c Blocked
Explanation: As any call attempt within a cell can be served by unused channels in fixed
channel strategy. If all the channels in that cell are occupied, the call is blocked and
subscriber does not receive any service.
45. a Borrowing channels from neighbouring cell
Explanation: In borrowing strategy, a cell is allowed to borrow channels from a
neighbouring cell if all of its own channels are already occupied. The MSC supervises such
borrowing procedure and ensures that the borrowing of channel does not interfere with any
call-in progress
46. a MSC
Explanation: Each time a call request is made, the serving base station requests a channel
from the MSC. The switch then allocates a channel to the requested cell following an
algorithm that takes into account the likelihood of future blocking within the cell.
47. b. Restricted Signal Strength Indicator
48. a Assigning different group of channels
49. a. True
50. b to use consecutive user time slots
UNIT II - Wireless Medium Access Control & Wireless
Telecommunications Systems
Q1 MIN stands for
a. Mobile Identification Number
b. Mobile Internet
c. Mobility In Network
d. None of the above

Q 2. The process of transferring a mobile station from one base station to another is
a. MSC
b. Roamer
c. Hand off
d. Forward channel

Q3 Hexagon shape is used for radio coverage for a cell because


a. It uses the maximum area for coverage
b. Fewer number of cells are required
c. It approximates circular radiation pattern
d. All of the above

Q4 Spectrum Efficiency of a cellular network is


a. The traffic carried by whole network
b. The traffic carried per cell divided by the bandwidth of the system and the area of a cell
c. Expressed in Erlang /MHz /km2
d. Both b and c
e. Both a and c

Q5 The advantage of using frequency reuse is


a. Increased capacity
b. Limited spectrum is required
c. Same spectrum may be allocated to other network
d. All of the above

Q6 In a fixed channel assignment strategy, if all the assigned channels are occupied,
the call
a. Gets transferred to another cell
b. Gets blocked
c. Is kept on waiting
d. All of the above

Q7 Advantage of using Dynamic channel assignment is


a. Blocking is reduced
b. Capacity of the system is increased
c. Both a & b
d. None of the above

Q8 Delay in handoffs is caused due to


a. Week signal conditions
b. High traffic conditions
c. Un availability of the channel
d. All of the above

Q9 When a fraction of assigned channel is reserved for handoffs, it is


a. Guard channel concept
b. Fixed channel assignment
c. Dynamic channel assignment
d. None of the above

Q10 While handoffs, the termination of call may be avoided by


a. Providing Guard channel
b. Queuing of handoffs
c. Both a & b
d. None of the above

Q11 Trunking in a cellular network refers to


a. Termination of a call
b. Spectrum unavailability
c. Accommodating large number of users in limited spectrum
d. All of the above

Q12 Traffic intensity is expressed in


a. Erlangs /MHz /km2
b. Erlangs
c. λ/ sec
d. dB/sec

Q13 Distributed antenna systems are used at


a. Transmitters of mobile systems
b. Transmitters of base stations
c. Inputs and outputs of repeaters
d. Receivers of mobile stations

Q14 Antenna down tilting refers to


a. Focusing radio energy towards ground
b. Decreasing the strength of antenna
c. Decreasing the S/N ratio at the antenna input
d. All of the above

Q15 Diffraction, at high frequencies, depends upon


1. Geometry of the object
2. Polarization of the incident wave
3. Amplitude of the incident wave
4. Frequency of the incident wave

a. 1 and 2 are correct


b. 1, 2 and 3 are correct
c. 2 and 3 are correct
d. All are correct
Q16 Frequency hopping involves a periodic change of transmission _______
a) Signal
b) Frequency
c) Phase
d) Amplitude

17. The bandwidth of the channel used in the hopset is called _________
a) Hopping bandwidth
b) Total hopping bandwidth
c) Instantaneous bandwidth
d) 3 dB bandwidth

Q18. A signal is a _____ that carries data from one network to another.
a. Electromagnetic
b. Electrical current
c. Electronic sign
d. None of the above

Q19 At what condition over modulation occur?


a. When the signal amplitude is greater than carrier amplitude
b. When signal amplitude and carrier amplitude are equal
c. When the signal amplitude is equal to zero
d. When the signal amplitude is infinity

Q20 What should be the value of modulation index for perfect modulation?
a) <1
b) 1
c) >1
d) Infinity

Q21 Modulation index is also called as _________.


a) Modulation wave
b) Modulation height
c) Modulation depth
d) ModulatioN

Q22 . What happens when overmodulation occurs?


a) Signal gets weak
b) More carrier power
c) Distortion
d) Both a and c

Q23 Which medium is used in radio transmission?


a) Air
b) Water
c) Space
d) Cable

Q24 What is the advantage of analog communication over digital communication?


a) Low data rate
b) the bandwidth of transmission channel is low
c) No synchronization is required
d) All the above

Q25 Which of the following is a continuous wave in analog modulation?


a) Pulse code modulation
b) Digital modulation
c) Amplitude modulation
d) Pulse amplitude modulation

Q26 What kind of modulation is used in television for sound signal?


a) Amplitude modulation
b) Frequency modulation
c) Phase modulation
d) Both a and b

Q27 What is the advantage of FM over AM?


a) Less noisy in reception
b) Carrier frequency Is high
c) Bandwidth is less
d) Frequency deviation is small

Q28 If all the signal frequencies in a radio receiver are amplified equally, then it has a
high _______.
a) High sensitivity
b) High fidelity
c) High selectivity
d) High distortion

Q29 . Which type of modulation is a man made called?


a) Amplitude modulation
b) Frequency modulation
c) Pulse modulation
d) Phase modulation

Q30 The synchronous time division multiplexing is not efficient because of___
a) data rate
b) infinite frames
c) empty slots
d) lower data rate

Q31 How many types of multiplexing are there?


a) one
b) two
c) three
d) four

Q32 Multiplexing is used in?


A. Packet switching
B. Circuit switching
C. Data switching
D. Packet & Circuit switching

Q33 If there are n signal sources of same data rate, then the TDM link has slots?
A. n
B. n/2
C. n*2
D. 2n

Q34 The sharing of a medium and its link by two or more devices is called?
A. Fully duplexing
B. Multiplexing
C. Micropleixng
D. Duplexing

Q35 Wireless transmission of signals can be done via ___________


a) radio waves
b) microwaves
c) infrared
d) all of the mentioned

Q36 Which of the following is the world’s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-541

Q37. Previously in 1980s, GSM stands for ____________


a) Global system for mobile
b) Groupe special mobile
c) Global special mobile
d) Groupe system mobile

Q38 Who sets the standards of GSM?


a) ITU
b) AT & T
c) ETSI
d) USDC

Q39. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic

Q40. Which of the following comes under supplementary ISDN services?


a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony
Explanation: Supplementary ISDN services are digital in nature. They include call diversion,
closed user groups, and caller identification, and are not available in analog mobile networks.
Supplementary services also include short messaging service (SMS).

Q41. Which of the following memory device stores information such as subscriber’s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS

Q42. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Explanation: The on the air privacy feature of GSM makes impossible to eavesdrop on a GSM
radio transmission. The privacy is made possible by encrypting the digital bit stream sent by a
GSM transmitter, according to a specific secret cryptographic key that is known only to the
cellular carrier.

Q43. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel

Q44.Radio capacity may be increased in cellular by_____


a) Increase in the radio spectrum
b) Increasing the number of base stations & reusing the channels
c) None of the above
d) Both a & b

Q45 . ___________ manages the switching function in GSM.


a) BSS
b) NSS
c) OSS
d) MSC

Q46. Which one of the following is considered as the GSM supplementary service?
a) Emergency number
b) SMS
c) Call forwarding
d) All of the above

Q47. Which of the following offers packet mode data transfer service over the cellular
network?
a) TCP
b) GPRS
c) GSM
d) None of the above

Q48. In which one of the following, the slow and fast hopping is used?
a) GSM
b) GPRS
c) FHSS
d) None of the above

Q49. Which of the following statements is correct about the FHSS?


a) FHSS is a type of narrowband signal
b) It uses the 78 frequency in the 2.4 GHz
c) It is referred as Frequency Hopping Spread Spectrum
d) All of the above

Q50. Cordless telephone standard, DECT stands for ____________


a) Discrete European Cordless Telephone
b) Digital European Cellular Telephone
c) Discrete European Cellular Telephone
d) Digital European Cordless Telephone
ANSWER KEY:

Unit-II

1. a. Mobile Identification Number


2. c. Hand off
3. d. All of the above
4. d. Both b and c
5. d. All of the above
6. b. Gets blocked
7. c. Both a & b
8. d. All of the above
9. a. Guard channel concept
10. c. Both a & b
11. c. Accommodating large number of users in limited spectrum
12. b. Erlangs
13. c. Inputs and outputs of repeaters
14. a. Focusing radio energy towards ground
15. b. 1, 2 and 3 are correct
16. b Frequency
17. c Instantaneous bandwidth
Explanation: The bandwidth of a channel used in the hopset is called the instantaneous
bandwidth. And the bandwidth of the spectrum over which the hopping occurs is called
total hopping bandwidth.
18. b. Electrical current
19. a. When the signal amplitude is greater than carrier amplitude
20. b 1
21. c Modulation depth
22. c Distortion
23. c Space
24. d All the above
25. c Amplitude modulation
26. b Frequency modulation
27. a Less noisy in reception
28. b High fidelity
29. a Amplitude modulation
30. c empty slots
31. c three
32. b. Circuit switching
33. a. n
34. b. Multiplexing
35. d all of the mentioned
36. a GSM
Explanation: GSM was the world’s first cellular system to specify digital modulation
and level architectures and services. It is the world’s most popular 2G technology. It
was developed to solve the fragmentation problems of the first cellular systems in
Europe.
37. b Groupe special mobile
Explanation: In the mid-1980s GSM was called by the name Groupe special mobile.
In 1992, GSM changed its name to Global System for Mobile Communication for
marketing reasons
38. c ETSI
Explanation: The setting of standards for GSM is under the aegis of the European
Technical Standards Institute (ETSI). GSM task was to specify a common mobile
communication system for Europe in the 900 MHZ band.
39. d Packet switched traffic
Explanation: GSM services follow ISDN guidelines and are classified as either
teleservices or data services. Teleservices include standard mobile telephony and
mobile originated or base originated traffic.
40. c Call diversion
Explanation: Supplementary ISDN services are digital in nature. They include call
diversion, closed user groups, and caller identification, and are not available in analog
mobile networks. Supplementary services also include short messaging service (SMS).
41. c SIM
Explanation: SIM (subscriber identity module) is a memory device that stores
information such as the subscriber’s identification number, the networks and countries
where the subscriber is entitled to service, privacy keys, and other user specific
information.
42. b On the air privacy
Explanation: The on the air privacy feature of GSM makes impossible to eavesdrop
on a GSM radio transmission. The privacy is made possible by encrypting the digital
bit stream sent by a GSM transmitter, according to a specific secret cryptographic key
that is known only to the cellular carrier.
43. d Channel
Explanation: The GSM architecture consists of three major interconnected subsystems
that interact between themselves and with the users through certain network interfaces.
The subsystems are BSS (Base Station Subsystem), NSS (Network and Switching
Subsystem) and OSS (Operation Support Subsystem).
44. b Increasing the number of base stations & reusing the channels
Explanation: The radio capacity can be increased in cellular by adding more base
stations and reusing the channels.
45. b NSS
Explanation: NSS (Network and Switching Subsystem) manages the switching
functions of the system. It allows the MSCs to communicate with other networks such
as PSTN and ISDN.
46. c Call forwarding
Explanation: Call forwarding is one of the many supplementary services like call hold,
calls waiting that are offered by the GSM (or Global Systems for Mobiles).
47. b GPRS
Explanation: General Packet Radio Service (or GPRS) can be considered as the
expansion of the Global System for Mobile communications (or GSM). It is a type of
packet-oriented standard that offers packet mode data transfer service over the cellular
network. So the correct answer will be B.
48. c FHSS
Explanation: The term "FHSS" stands for frequency-hopping spread spectrum, a
method of transmitting radio signals through rapidly changing carrier frequency
between different frequencies and uses slow and fast hopping.
49. c It is referred as Frequency Hopping Spread Spectrum
Explanation: The term "FHSS" is referred to as the Frequency Hopping Spread
Spectrum as it is a type of narrowband signal that uses the 78 frequency in the 2.4 GHz
and uses the frequency hopping system. So the correct answer is D.
50. d Digital European Cordless Telephone
Explanation: The Digital European Cordless Telephone (DECT) is a universal
cordless telephone standard. It was developed by the European Telecommunications
Standard Institute (ETSI).
UNIT III - Satellite Systems & Wireless LANs

Q1.What is the reason for carrying multiple transponders in a satellite?


a) More number of operating channels
b) Better reception
c) More gain
d) Redundancy

Q2. The system of satellites that circle the earth and can determine any position is known
as a.
(A) GPS
(B) LAN
(C) Receiver
(D) MAN

Q3. What is the reason for shifting from c band to ku band in satellite communication?
(A) Lesser attenuation
(B) Less power requirements
(C) More bandwidth
(D) Overcrowding is through a satellite rather than phone lines

Q4. Which of the following bands cannot be used for satellite communication?
(A) MF
(B) Ku
(C) X
(D) C

Q5. What is the full form of WLAN?


(A) Wide Local Area Network
(B) Wireless Local Area Network
(C) Wireless Land Access Network
(D) Wireless Local Area Node

Q6. Which of the following is not a standard of WLAN?


(A) HIPER-LAN
(B) HIPERLAN/2
(C) IEEE 802.11b
(D) AMPS

Q7. Which of the following is the 802.11 High base station Rate Standard?
(A) IEEE 802.15
(B) IEEE 802.15.4
(C) IEEE 802.11g
(D) IEEE 802.11b

Q8. Which of the following spread spectrum techniques were used in the original IEEE
802.11 standard?
(A) FHSS and DSSS
(B) THSS and FHSS
(C) THSS and DSSS
(D) Hybrid technique

Q9. Which of the following WLAN standard has been named Wi-Fi?
(A) IEEE 802.6
(B) IEEE 802.15.4
(C) DSSS IEEE 802.11b
(D) IEEE 802.11g

Q10. What is the range of asynchronous user data rates provided by HIPER-LAN?
(A) 1-100 Mbps
(B) 50-100 Mbps
(C) 1-20 Mbps
(D) 500 Mbps to 1 Gbps

Q11. What is the name of the European WLAN standard that provides user data rate
upto 54 Mbps?
(A) UNII
(B) WISP
(C) MMAC
(D) HIPERLAN/2

Q12. What is WISP?


(A) Wideband Internet Service Protocol
(B) Wireless Internet Service Provider
(C) Wireless Instantaneous Source Provider
(D) Wideband Internet Source Protocol

Q13. The DECT system is based on __________ principles.


a) TCP
b) IP
c) OSI
d) AMPS

Q14. Which of the following layer is responsible for providing reliable data links?
a) Physical layer
b) Network layer
c) Data link control layer
d) MAC layer
Q15. UMTS use which multiple access technique?
a) CDMA
b) TDMA
c) FDMA
d) SDMA

Q16. UMTS does not has backward compatibility with ____________


a) GSM
b) IS-136
c) IS-95
d) GPRS
Q17. What is the chip rate of W-CDMA?
a) 1.2288 Mcps
b) 3.84 Mcps
c) 270.833 Ksps
d) 100 Mcps

Q18. What is the minimum spectrum allocation required by W-CDMA?


a) 5 MHz
b) 20MHz
c) 1.25 MHz
d) 200 KHz

Q19. How much increase in spectral efficiency is provided by W-CDMA in comparison


to GSM?
a) Two times
b) Three times
c) No increase
d) Six times

Q20. Which of the following is not a characteristic of 3G network?


a) Communication over VoIP
b) Unparalleled network capacity
c) Multi-megabit Internet access
d) LTE based network

Q21. What is the term used by ITU for a set of global standards of 3G systems?
a) IMT 2000
b) GSM
c) CDMA
d) EDGE

Q22. Which of the following is not a standard of 3G?


a) UMTS
b) Cdma2000
c) TD-SCDMA
d) LTE

Q23. Which of the following is supported data rates of 4G Networks?


a) 1024kbps
b) 100mbs
c) 200mbps
d) None of the above

Q24. What is the average uploading speed of 4G LTE network?


a) 1-3 Gbps
b) 2-5 Gbps
c) 1-3 Mbps
d) 2-5 Mbps
Explanation: Verizon 4G LTE wireless broadband is 10 times faster than 3G able to handle
download speeds between 5 and 12 Mbps (Megabits per second) and upload speeds between 2
and 5 Mbps

Q25. What location management feature is supported by 4G?


a) Concatenated Location Registration
b) Concurrent Location Register
c) Concatenated Management
d) Collated Location Registration

Q26. What type of handovers is supported by LTE?


a) Hard handover only
b) Soft handover only
c) Hard and soft handover
d) Hard, soft and softest handover

Q27. What is the drawback of dynamic channel assignment ?


a. Decrease channel utilization.
b. Increase probability of blocked call.
c. Cross talk.
d. Increase storage and computational load on system.

Q28. What is the condition for handoff ?


A. A mobile moves into a different cell while ln conversation.
B. A mobile remains in the same cell while in conversation.
C. A mobile moves lo different cell when Idle.
D. A mobile remains in the same cell and is idle.

Q29. The time over which a call can be maintained within a cell without handoff is called
a. Run time.
b. Peak time.
c. Dwell time.
d. Cell time .

Q30. MAHO stands for _______


A. MSC assisted handoff .
B. Mobile assisted handoff .
C. Machine assisted handoff.
D. Man assisted handoff.

Q31. What is the condition for intersystem Interference ?


A. Mobile moves from one cell to another cell.
B. Mobile remains ln the same cell.
C. Mobile moves from one cellular system to another cellular system.
D. Mobile remains in the same cluster.

Q32. What are co-channel cells ?


A. Cells having different base stations .
B. Cells using different frequency.
C. Cells using adjacent frequency.
D. Cells using same frequency.

Q33. Co-channel reuse ratio is defined by________


A. a=o*R.
B. Q=O/R.
C. Q=0||R.
D. 0=1/R.

Q34. Frequency division multiple access (FDMA) assigns __ channels to __ users


A. Individual, individual.
B. Many, individual .
C. Individual, many "".
D. Many, many.

Q35. The FDMA channel carries ________________phone circuit at a lime.


A. Ten.
B. Two.
C. One.
D. Several.

Q36. The symbol time in FDMA systems is___________ thus intersymbol Interference
is_____________
A. Large, high .
B. Small, low .
C. small, high.
D. Large, low.

Q37. Which of The following is not true for FDMA systems as compared to TDMA
systems ?
A. low complexly.
B. lower call site system cost.
C. Tight RF entering.
D. Narrow bandwidth.

Q38. ---------------------- is based on FDMA/FDD ?


A. GSM.
B. W-CDMA.
C. Cordless telephone.
D. AMPS.

Q39. Preamble contains ------------------------


A. Address.
B. Data.
C. Guard bits.
D. Trail bits.

Q40._________ are utilized to allow synchronization of the receivers between different


slots and frames.
A. Preamble.
B. Data.
C. Guard bits.
D. Trail bits.

Q41. Which of the following Is not true for TDMA?


A. Single carrier frequency for single user.
B. Discontinuous data transmission.
C. No requirement of duplexers.
D. High transmission rate.

Q42. Which of the following is the world's first cellular system to specify digital
modulation and network level architecture ?
A. GSM.
B. AMPS.
C. CDMA.
D. IS-54.

Q43. Which of the following does not come under teleservices of GSM ?
A. Standard mobile telephony.
B. Mobile originated traffic.
C. Base originated traffic.
D. Packet switched traffic.

Q44. Which of the following does not come under subsystem of GSM architecture ?
A. BSS .
B. NSS .
C. OSS.
D. Channel.

Q45. Cordless telephone standard, DECT stands for.


A. Discrete European Cordless Telephone.
B. Digital European Cellular Telephone.
C. Discrete European Cellular Telephone.
D. Digital European Cordless Telephone.

Q46. Which of the following is not true for DECT ?


A. High traffic density.
B. Long range telecommunication.
C. Broad range of application .
D. First pan European standard.

Q47. ____ is the main signaling layer of DECT.


A. Physical layer.
B. Data link layer.
C. MAC layer.
D. Network layer.

Q48. RFID stands for.


A. Random frequency identification.
B. Radio frequency identification.
C. Random frequency information.
D. Radio frequency information.

Q49. What is the full form of UMTS ?


A. Universal Mobile Telephone System.
B. Ubiquitous Mobile Telephone System.
C. Ubiquitous Mobile Telemetry System.
D. Universal Machine Telemedicine 64 System.

Q50. UMTS use which multiple access technique?


A. CDMA.
B. TDMA.
C. FDMA.
D. SDMA.

.
ANSWER KEY:

Unit-III

1. a) More number of operating channels


Explanation: To be economically feasible, a satellite must be capable of handling
several channels. As a result, most satellites contain multiple transponders, each
operating at a different frequency. Each transponder represents an individual
communication channel.
2. a GPS
Explanation: The global positioning system (GPS) is a network of satellites and
receiving devices used to determine the location of something on Earth. Some GPS
receivers are so accurate they can establish their location within 1 centimetre (0.4
inches).
GPS receivers provide location in latitude, longitude, and altitude. They also provide
the accurate time.
3. d Overcrowding is through a satellite rather than phone lines
Explanation: Most new communication satellites will operate in the Ku band. This
upward shift in frequency is happening because the C band is overcrowded. Many
communication satellites are in orbit now, most of them operating in the C band.
However, there is some difficulty with interference because of the heavy usage. The
only way this interference will be minimized is to shift all future satellite
communication to higher frequencies.
4. a MF
Explanation: MF is a lower frequency band than Ku, C and X bands and does not lie in
the microwave spectrum. Microwaves are used for satellite communication since the
lower bands get reflected by the ionosphere.
5. b Wireless Local Area Network
6. d AMPS
Explanation: AMPS is a standard of first-generation network. HIPERLAN is a WLAN
standard developed in Europe in mid 1990s. HIPERLAN/2 is also developed in Europe
that provides up to 54 Mbps of user data.
7. d IEEE 802.11b
Explanation: IEEE 802.11b was a high rate standard approved in 1999. It provided
new data rate capabilities of 11 Mbps, 5.5 Mbps in addition to the original 2 Mbps and
1 Mbps user rates of IEEE 802.11.
8. a FHSS and DSSS
Explanation: Original IEEE 802.11 used both the approaches of FHSS (Frequency
Hopping Spread Spectrum) and DSSS (Direct Sequence Spread Spectrum). But from
late 2001s, only DSSS modems are used within IEEE 802.11
9. c DSSS IEEE 802.11b
Explanation: The DSSS IEEE 802.11b standard has been named Wi-Fi by the Wireless
Ethernet Compatibility Alliance. It is a group that promotes adoption of 802.11 DSSS
WLAN.
10. c 1-20 Mbps
Explanation: HIPER-LAN provides asynchronous user data rates of between 1 to 20
Mbps, as well as time bounded messaging of rates of 64 kbps to 2.048 Mbps. It uses
5.2 GHz and 17.1 GHz frequency bands.
11. d HIPERLAN/2
Explanation: HIPERLAN/2 has emerged as the next generation European WLAN
standard. It provides upto 54 Mbps of user data to a variety of networks. The networks
include the ATM backbone, IP based networks and the UMTS network.
12. b Wireless Internet Service Provider
Explanation: A wireless Internet service provider (WISP) is an Internet
service provider with a network based on wireless networking.
13. C OSI
Explanation: The DECT system is based on OSI (Open System Interconnection)
principles in a manner similar to ISDN. A control plane (C-plane) and a user plane (U-
plane) use the services provided by the lower layers.
14. c. Data link control layer
Explanation: The DLC (data link control) layer is responsible for providing reliable data
links to the network layer. It divides up the logical and physical channels into time slots for
each user
15. a CDMA
Explanation: Although UMTS is designed to operate on evolved GSM core networks, it
uses code division multiple access (CDMA) for its air interface. The majority of the 3G
systems in operation employ CDMA, while the rest use TDMA. CDMA allows various
users to share a channel at the same time, while TDMA allows users to share the same
channel by chopping it into different time slots
16. c IS-95
Explanation: UMTS assures backward compatibility with the second generation GSM, IS-
136 and PDC TDMA technologies. It is also compatible with all 2.5G TDMA techniques
like GPRS and EDGE. But it does not provide compatibility to CDMA technologies of 2G
and 2.5 G. IS-95 is a CDMA standard of 2G
17. b 3.84 Mcps
18. a 5 MHz
Explanation: W-CDMA/UMTS requires a minimum spectrum allocation of 5 MHz. Using
this bandwidth, it has the capacity to carry over 100 simultaneous voice calls. It is able to
carry data at speeds up to 2 Mbps in its original format. 20 MHz is the bandwidth defined
for LTE. CdmaOne uses a bandwidth of 1.25 MHz. GSM’s bandwidth is 200 KHz.
19. d Six times
Explanation: W-CDMA can provide at least six times an increase in spectral efficiency
over GSM at system level. Such a wider bandwidth is chosen to higher data rates as low as
8 kbps to as high as 2 Mbps on a single 5 MHz W-CDMA radio channel.
20. d LTE based network
Explanation: Multi-megabit Internet access, communication using Voice over internet
Protocol (VoIP), voice activated calls, unparalleled network capacity are some of the
characteristics of 3G network. 3G systems promise unparalleled wireless access which is
not possible in 2G systems. LTE (Long term Evolution) is a standard of 4G systems.
21. a IMT 2000
Explanation: International Telecommunications Union (ITU) used the term IMT-2000 in
1998. It is used for a set of global standards for third generation (3G) mobile telecoms
services and equipment
22. d LTE
Explanation: UMTS (Universal Mobile Telecommunication System), TD-SCDMA (Time
Division Synchronous Code Division Multiple Access), Cdma2000 are the standards
defined for 3G networks. LTE (Long Term Evolution) is a 4G standard for high speed
wireless communication.
23. b 100mbs
24. d 2-5 Mbps
Explanation: Verizon 4G LTE wireless broadband is 10 times faster than 3G able to handle
download speeds between 5 and 12 Mbps (Megabits per second) and upload speeds
between 2 and 5 Mbps
25. a Concatenated Location Registration
26. a Hard handover only
27. d. Increase storage and computational load on system.
Explanation: Dynamic channel assignment requires the MSC to collect real time data on
channel occupancy, traffic distribution and RSSI of all channels on continuous basis. This
increases the storage and computational load on the system but provides the advantage of
increased channel utilization and decreased probability of blocked call.
28. a. A mobile moves into a different cell while ln conversation.
29. c. Dwell time.
Explanation: The time over which a call is maintained within a cell without handoff is
called as dwell time. Dwell time vary depending on speed of user and type of radio
coverage. They include propagation, interference, distance between the subscriber and the
base station, and other time varying effects.
30. b. Mobile assisted handoff .
31. c. Mobile moves from one cellular system to another cellular system.
32. d. Cells using same frequency.
Explanation: Due to frequency reuse concept, there are several cells that use the same set of
frequencies. These cells are called co-channel cells. And the interference between these cells
is called co-channel interference.
33. b. Q=O/R.
Explanation: Co-channel reuse ratio is defined by Q=D/R. By increasing the ratio of D/R, the
spatial separation between co-channel cells relative to the coverage distance of a cell is
increased. Thus, interference I reduced from improved isolation of RF energy from the co-
channel cells.
34. a.Individual, individual.
35. .c. One.
Explanation: The FDMA channel carries one phone circuit at a time. Each individual band
or channel is wide enough to accommodate the signal spectra of the transmissions to be
propagated.
36. d. Large, low.
Explanation: The symbol time of a narrowband signal is large as compared to the
average delay spread. This implies that the amount of intersymbol interference is low
and, thus, little or no equalization is required in FDMA narrowband systems.
37.b. lower call site system cost.
38. d AMPS.
39. a. Address.
Explanation: TDMA frame is made up of a preamble, an information message and the
trail bits. In a TDMA frame, the preamble contains the address and synchronization
information that both the base station and the subscribers use to identify each other.
40. c. Guard bits.
Explanation: Guard bits are utilized to allow synchronization of the receivers between
different slots and frames. TDMA/FDD systems intentionally induce several
time slots of delay between the forward and reverse time slots for a particular user.
41. a. Single carrier frequency for single user.
42. a. GSM
43. d.Packet switched traffic.
Explanation: GSM services follow ISDN guidelines and are classified as either
teleservices or data services. Teleservices include standard mobile telephony and
mobile originated or base originated traffic
44. d. Channel.
Explanation: The GSM architecture consists of three major interconnected subsystems
that interact between themselves and with the users through certain network interfaces.
The subsystems are BSS (Base Station Subsystem), NSS (Network and Switching
Subsystem) and OSS (Operation Support Subsystem).
45. d.Digital European Cordless Telephone.
46. b.Long range telecommunication.
47. d. Network layer.
48. b. Radio frequency identification.
49. a.Universal Mobile Telephone System.
50. a. CDMA.
UNIT IV - Mobile Network Layer
Q1 Header of datagram in IPv4 has _________
a) 0 to 20 bytes
b) 20 to 40 bytes
c) 20 to 60 bytes
d) 20 to 80 bytes

Q2. In IPv4, service type of service in header field, first 3 bits are called
a) Type of service
b) Code bits
c) Sync bits
d) Precedence bits

Q3. _______ is responsible for tunneling multicast packets to the MS’s currently
subscribed FA.
a. Multicast home agent
b. Mobile multicast
c. Mobile station
d. Base station
solution: Multicast home agent (MHA) is responsible for tunneling multicast packets to
the MS’s currently subscribed FA. MHA serves MSs that are roaming around the foreign
networks and are within its service range.

Q4. Every MS can have only one MHA.


a. True
b. False

Q5. The process of transferring a mobile station from one base station to another
a) MSC
b) Roamer
c) Hand off
d) Forward channel

Q6. Which of the following is not an essential element of a VPN


a)Tunneling
b)Encapsulation
c)Protocols
d)Encryption

Q7. Which of the following is not a VPN protocol?


a)PPTP
b) L2F
c) SLIP
d) IPSec

Q8.Network layer at source is responsible for creating a packet from data coming from
another __
a) Station
b) Link
c) Node
d) Protocol

Q9. ____________ relies on IGMP.

a) MMP
b) RMDP
c) RM2
d) Mobicast

Q10. DHCP (dynamic host configuration protocol) provides __________ to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned

Q11. The DHCP server _________


a) maintains a database of available IP addresses
b) maintains the information about client configuration parameters
c) grants a IP address when receives a request from a client
d) all of the mentioned

Q12. Which of the following is not a denial of service attack?


a)Exploiting a flaw in a program to consume 100 percent of the CPU
b)Sending malformed packets to a system, causing it to freeze
c) Performing a brute force attack against a known user account
d) Sending thousands of e-mails to a single address

Q13. Which of the following is a digital end-to-end communications mechanism


developed by telephone companies to support high-speed digital communications over the
same equipment and infrastructure that is used to carry voice communications?
a) ISDN
b) Frame Relay
c) SMD
d) ATM

Q14. Which of the following can be used to bypass even the best physical and logical
security mechanisms to gain access to a system?
a) Brute force attacks
b) Denial of service
c) Social engineering
d) Port scanningView Answer
Q15 At which OSI model layer does the IPSec protocol function?
a. Data Link
b. Transport
c. Session
d. NetworkView Answer
Q16. After obtaining the IP address, to prevent the IP conflict the client may use
_________
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned

Q17. Tunnel connections can be established over all except for which of the following?
a) WAN links
b) LAN pathways
c) Dial-up connections
d) Stand-alone systems

Q18. Which functionality of the network layer deals with the necessity of a three-way
handshake usually before the transmission of data from sender to receiver?
a. Path determination
b. Forwarding
c. Call Set-up
d. All of the above

Q19. What type of handovers Is supported by LTE?


A. Hard handover only.
B. Soft handover only.
C. Hard and soft handover.
D. Hard, soft and softest handover.

Q20. Which organization Is responsible for developing LTE standards ?


A. UMTS.
B. 3GPP.
C. 3GPP2.
D. ISO.

Q21. ln LTE, what is the benefit of PAPR reduction ln the uplink ?


A. Improved uplink coverage.
B. Reduced equalizer complexity .
C. Lower UE power consumption.
D. Improved uplink coverage, lower UE power consumption and reduced equalizer.

Q22. The mechanism behind electromagnetic wave propagation cannot be attributed to-
---------------
A. Reflection.
B. Diffraction.
C. Scattering.
D. Sectoring.

Q23. The Propagation model that estimates the radio coverage of a transmitter is called?
A. Large scale propagation model.
B. Small scale propagation model.
C. Fading model .
D. Okumura model.
Q24. Propagation model that characterize rapid fluctuation is called ______________
A. Hata model .
B. Fading model .
C. Large scale propagation model.
D. Okumura model.

Q25. Free space propagation model is to predict_______________


A. Received signal strength.
B. Transmitted power.
C. Gain or transmitter.
D. Gain of receiver .

Q26. The satellite that is used as a relay to extend communication distance is called
as______
A. Relay satellites.
B. Communication satellites.
C. Repeater satellites .
D. Geosynchronous satellites.

Q27. The transmitter-receiver combination in the satellite is known as a _____________


a. Relay .
b. Repeater.
c. Transponder.
d. Duplexer.

Q28. Ad Hoc Wireless Networks are


A. Single-Hope Wireless Network
B. Multi-Hop Wireless Network
C. Both A and B
D. None of the Above

Q29. What is MANET?


A. Multiple and network
B. Mobile ad hoc network
C. Main ad hoc network evaluation
D. Multiple ad hoc network

Q30. Ad-hoc network to connect each computer using network topology


A. Tree
B. Star
C. Mesh
D. Bus

Q31. Ad Hoc Wireless Networks are


A. Infrastructure less network
B. Fixed Infrastructure network
C. Both A and B
D. None of the above.
Q32. AWN has ………….
A. Guaranteed bandwidth
B. Shared radio channel
C. Both A and B
D. None of the above

Q33.Application of AWN
A. Military Application
B. Emergency operations
C. Wireless mesh network
D. All of the above

Q34. Mobility of nodes is the issue of sensor networks.


A. Yes
B. No

Q35. Power sources used in sensor network


A. Replenish able
B. Non-replenish able
C. Regenerative
D. All of the above

Q36. Major advantages of hybrid wireless network.


A. Higher capacity than cellular networks
B. Increased flexibility and reliability in routing.
C. Both A and B
D. None of the above

Q37.What is MAC?
A. Medium Access control protocol.
B. Medium Access communication protocol.
C. Multiple Access control protocol.
D. Multiple Access communication protocol.

Q38. Design issue in MAC protocol.


A. Hidden terminal
B. Size of network.
C. Density of deployment
D. May not be

Q39. The major performance degradation faced by a reliable connection-oriented


transport layer protocol such as transmission control protocol (TCP) in an ad-hoc
wireless network arises due to
A. Frequent path breaks
B. High channel error rate
C. Frequent network partitions.
D. All of the above
Q40. The latency associated with the reconfiguration of a broken path and the use of
route caches result in
A. Frequent path breaks
B. Stale route information at the nodes
C. Mobility
D. None of the above

Q41. The attack effected by making the network resource unavailable for service to other
nodes, either by consuming the bandwidth or by overloading the system, is known as
A. Resource consumption
B. Bandwidth depletion
C. Denial of service
D. None of the above

Q42. Which of the following is not an open standard?


(A) Bluetooth
(B) WWW
(C) HTML
(D) VPN

Q43. Bluetooth standard is named after_______


(A) King Ronaldo Bluetooth
(B) Pope Vincent Bluetooth
(C) King Herald Bluetooth
(D) Pope Francis Bluetooth

Q44. Bluetooth operates in which band?


(A) Ka Band
(B) L Band
(C) Ku Band
(D) 2.4 GHz ISM Band

Q45. Which of the following scheme is used by Bluetooth?


(A) Frequency hopping TDD scheme
(B) Frequency hopping FDD scheme
(C) DSSS TDD scheme
(D) DSSS FDD scheme

Q46. Which modulation scheme is used by Bluetooth?


(A) DQPSK
(B) MSK
(C) GFSK
(D) BPSK

Q47. Which of the following is not an objective for channel assignment strategies?
(A) Efficient utilization of spectrum –
(B) Increase of capacity
(C) Minimize the interference
(D) Maximize the interference

Q48. Which of the following are components of a sensor node?


a. Mesh network
b. Microcontroller
c. GPU
d. All of the above

Q49. Which sensor network topology has no single point of failure?


a. Point-to-point
b. Mesh
c. Star
d. All of the above

Q50. A Sensor network is designed to perform a set of high-level information processing


task such as _____
A. Detection
B. Detection & Tracking
C. Detection & Classification
D. Detection, Tracking & Classification
ANSWER KEY:

Unit-IV

1. c. 20 to 60 bytes
2. d) Precedence bits
Explanation: The 8-bit ToS (type of service) in IPv4 uses 3 bits for IP Precedence, 4 bits for
ToS with the last bit not being used. The 4-bit ToS field, although defined, has never been used.
3. a. Multicast home agent
4. a. True
5.c. Hand off
6. d Encryption
7. c. SLIP
8. d Protocol
9. c RM2
10. a IP address
11. d. all of the above
12. c. Performing a brute force attack against a known user account
13. a. ISDN
14. c. Social engineering
15. d. Network
16. c address resolution protocol
17. d. Stand-alone systems
18. c. Call Set-up
19. a. Hard handover only.
20. b. 3GPP.
Explanation: The 3rd Generation Partnership Project (3GPP) is collaboration between groups
of telecommunications standards associations, known as:
the Organizational Partners. LTE (Long Term Evolution) introduced in 3GPP R8, is the access
part of the Evolved Packet System (EPS).
21. d. Improved uplink coverage, lower UE power consumption and reduced equalizer.
22. d. Sectoring.
Explanation: The mechanisms behind electromagnetic wave propagation are diverse. They
can be greatly attributed to reflection, diffraction and scattering. Due to multiple reflections
from various objects, the electromagnetic waves travel along different paths of varying lengths.
23. b. Small scale propagation model.
24. b. Fading model .
Explanation: Small scale propagation model is also called fading model. Fading model
characterize the rapid fluctuations of the received signal strength over very short distance of a
few wavelengths or short time duration. The propagation models are used to estimate the
performance of wireless channels.
25. a. Received signal strength.
26. b. Communication satellites.
Explanation: Communication satellites are not originators of information to be transmitted. If
a transmitting station cannot communicate directly with one or more receiving stations because
of line-of-sight restrictions, a satellite can be used. The transmitting station sends the
information to the satellite, which in turn re-transmits it to the receiving stations
27.c. Transponder.
28. c. Both A and B
29. b. Mobile ad hoc network
30. c. Mesh
31. a. Infrastructure less network
32. c. Both A and B
33. d. All of the above
34. a. Yes
35. c. Regenerative
36. c. Both A and B
37. a. Medium Access control protocol.
38. a. Hidden terminal
39. d. All of the above
40. b. Stale route information at the nodes
41. c. Denial of service
42. d. VPN
Explanation: An open standard is a standard that is publicly available. It has various rights to
use associated with it. Bluetooth is an open standard that has been embraced by over thousand
manufacturers of electronic appliances. VPN (Virtual Private Network) is a private network.
43. c. King Herald Bluetooth
Explanation: Bluetooth standard is named after King Harald Bluetooth. He was the 10th
century Viking who united Denmark and Norway. The Bluetooth standard aims to unify the
connectivity chores of appliances within the personal workspace of an individual.
44. d 2.4 GHz ISM Band
Explanation: Bluetooth is a radio technology operating in 2.4 GHz frequency band. Bluetooth
is best suited for low-bandwidth applications like transferring sound data with telephones (i.e.
with a Bluetooth headset) or byte data with hand-held computers (transferring files) or
keyboard.
45. a. Frequency hopping TDD scheme
Explanation: Frequency hopping TDD (Time Division Duplexing) scheme is used by
Bluetooth. Frequency hopping provides a form of multiple access among co-located devices in
different piconets.
46. c. GFSK
Explanation: Gaussian Frequency Shift Keying
Bluetooth technology uses a special binary frequency shift keying modulation scheme called
Gaussian Frequency Shift Keying (GFSK).
47. d. Maximize the interference
Explanation: The objective of channel assignment strategy is to utilize the spectrum
efficiently. And for efficient utilization, a frequency reuse scheme consistent with the objective
of increasing capacity and minimizing interference is required.
48.b. Microcontroller
49. b. Mesh
50. d. Detection, Tracking & Classification
UNIT V - Mobile Transport Layer & Support for Mobility
Q1 General goal of a file system
a. Efficient
b. Transparent
c. Consistent
d. All of this

Q2. Why Efficiency in file system is of special importance for wireless systems
a. bandwidth is low
b. bandwidth is high
c. Both
d. No one

Q3. What problem does Transparency addresses in file system


a. Problems of location-dependent
b. Problem of bandwidth
c. Problem of consistent
d. No problem

Q4. Why MIo-NFS uses a pessimistic approach with tokens controling access to files
a. MIo-NFS avoid buffering
b. MIo-NFS avoids write conflicts
c. Both
d. no one

Q5. What is a stateless, lightweight, application level protocol for data transfer between
servers and clients
a. Html
b. Head
c. HTTP
d. All of this

Q6. What is system architecture of WWW


a. Client side only
b. client/server system
c. Server side only
d. None of this

Q7. Allowing terminals and software from different vendors to communicate with
networks from different providers
(a) reliable
(b) scaleable
(c). secure
(d) interoperable

Q8. protocols and services should scale with customer needs and number of customers
a. reliable
b. scalable
c. secure
d. interoperable

Q9. WDP stands for


a. Wireless datagram protocol
b. Wireless database protocol
c. wireless datafetch protocol
d. none of the above

Q10. WCMP stands for


(a) Wireless communication map protocol
(b) Wireless communicate message protocol
© Wireless control map protocol
(d) wireless control message protocol

Q11. WDP offers source and destination port numbers used for
a. multiplexing
b. demultiplexing
c. both
d. no one

Q12. If a higher layer requests a service the WDP cannot fulfill, this error is indicated
with the
a. T-DError.ind
b. T-AError.ind
c. T-CError.ind
d. None of this

Q13. Use of error code (EC)


a. indicating the reason for the error to the higher layer
b. indicating the reason for the error to the lower layer
c. indicating the reason for the error to the middle layer
d. none of this

Q14. WTLS stands for


(a) Wireless transport layer security
(b) Wireless transport layer service
(c) Wireless transport layer session
(d) none of the above

Q15. What does Wireless transaction protocol class 0 offers


a. Class 0 provide reliable message transfer with result message
b. Class 0 provides unreliable message transfer without any result message
c. Class 0 provide unreliable message transfer with result message
d. None of the above

Q16. What does class 1,2 provide in wireless transaction protocol


a. Class 1,2 provides unreliable message transfer without any result message
b. Class 1,2 provide no message transfer
c. Class 1,2 provide reliable message transfer
d. None of the above
Q17. WTP wireless transaction protocol achieves reliability using
a. duplicate removal, retransmission,
b. acknowledgements
c. unique transaction identifier
d. All of this

Q18. Service primitives offered by WTP are


(a) TR-Invoke to initiate a new transaction,
(b)TR-Result to send back the result of a previously initiated transaction
(c)TR-Abort to abort an existing transaction
(d) All of this

Q19. wireless session protocol WSP stands for


a. wireless session protocol
b. wireless size protocol
c. wireless shape protocol
d. None of the above

Q20. How problem of file system can be solved


(a)Replication of data (coping, cloning,caching)
(b)Data collection in advance( hoarding, pre-fetching)
(c)Both
(d)None of the above

Q21. TCP supports many of the Internet’s most popular application protocols and
resulting applications, including the –
a. World Wide Web,
b. e-mail
c. File Transfer Protocol and Secure Shell
d. All of the above

Q22.In the Internet protocol suite, TCP is the intermediate layer between
the —– .
a. Internet layer and application layer
b. Mobile laver and application layer
c. Transport layer and application layer
d. Session layer and application layer

Q23. The major responsibilities of TCP in an active session are to:


a. Provide reliable in-order transport of data
b. Control congestions in the networks
c. Control a packet flow between the transmitter and the receiver
d. All of the above

Q24. In TCP protocol to mitigate congestion, TCP —————–the transmission rate


dramatically.
a. Stop the transmission
b. Wait to resolve the congestion
c. Slows down
d. None of the above
Q25.The behavior of TCP shows after the detection of congestion is called
a. Slow start
b. Slows down
c. Wait to restart
d. None of the above

Q26. In TCP during the slow start doubling the congestion window, every time
acknowledgments come back until reaching the congestion threshold is called
a. The exponential growth of the congestion window
b Doubling the growth of the congestion window
c. Linear growth of the congestion window
d. None

Q27. As soon as the congestion window reaches the congestion threshold, further increase
of the transmission rate is only linear by adding ……… to the congestion window each
time the acknowledgments come back.
a. 1
b. 2
c. 3
d. None of the above

Q28. In TCP/IP, ———————— is a congestion control algorithm that makes it


possible to quickly recover lost data packets.
a. fast retransmit and fast recovery
b. Fast retransmit
c. Fast recovery
d. None of the above

Q29.Due to packet loss due to transmission error the sender can now retransmit the
missing packet(s) before the timer expires. This behavior is called
a. Fast retransmit
b. Fast recovery
c. Congestion control
d. None

Q30. Problems with Traditional TCP in wireless environments is/are


a. Slow Start mechanism in fixed networks decreases the efficiency of TCP if used with mobile
receivers or senders.
b. Error rates on wireless links are orders of magnitude higher compared to fixed fiber or copper
links. This makes compensation for packet loss by TCP quite difficult.
c. Mobility itself can cause packet loss. There are many situations where a soft handover from
one access point to another is not possible for a mobile end-system.
d. All of the above

Q31.Indirect TCP segments a TCP connection into a fixed part and a ——-
a. wireless part
b. wired part
c. either wireless part or wired part
d. None of the above
Q32. In I-TCP a suitable place for segmenting the connection is at the ……………………
as it not only controls the mobility of the mobile host anyway and can also hand over the
connection to the next foreign agent when the mobile host moves on.
a. Router
b. Home agent
c. Foreign agent
d. Access point

Q33. Disadvantages of I-TCP includes –


a. Loss of end-to-end semantics
b. Higher latency possible
c. Security issues
d. All of the above

Q34. In the I TCP the Foreign Agent (FA) becomes or acts as a —— and relays data in
both directions
a. Proxy
b. Router
c. Node
d. Access point

Q35. Which of the following buffers data close to the mobile host to perform fast local
retransmission in case of packet loss.
a. Indirect TCP
b. Snooping TCP
c. Foreign agent
d. None of the following

Q36. A new enhancement, which leaves the TCP connection intact and is completely
transparent, is ———–
a. Mobile TCP
b. Snooping TCP
c. I TCP
d.None

Q37.M-TCP is specially adapted to the problems arising from lengthy or frequent ——


——–
a. Delay packet
b. Packet loss
c. disconnections
d. None

Q38.In which of the following the sender can now determine precisely which packet is
needed and retransmit it?

a. I TCP
b. M TCP
c. Selective transmission
d. None of the above
Q39 A packet in Transmission Control Protocol (TCP) is called a ____________
a) Transmittable slots
b) Packet
c) Segment
d) Source Slots

Q40. Cable TV and DSL are examples of ____________


a) Interconnection of network
b) LAN
c) MAN
d) WAN

Q41. Station on a wireless ALOHA network is maximum of ________


a) 400 Km
b) 500 Km
c) 600 Km
d) 700 Km

Q42. IEEE 802.11 defines basic service set as building block of a wireless ___________
a) LAN
b) WAN protocol
c) MAN
d) ALOHA

Q43. In wireless LAN, there are many hidden stations so that __________ cannot be
detected.
a) Frames
b) Collision
c) Signal
d) Data

Q44. A set that makes stationary or mobile wireless station and also have optional central
base station is known as ___________
a) Basic service set
b) Extended service set
c) Network point set
d) Access point

Q45. Wireless communication started in _________


a) 1869
b) 1895
c) 1879
d) 1885

Q46. Wireless transmission is divided into ___________


a) 3 broad groups
b) 6 broad groups
c) 9 broad groups
d) 8 broad groups
Q47. Transmission Control Protocol/Internet Networking Protocol have ___________
a) Four Layers
b) Five Layers
c) Six Layers
d) Seven Layers

Q48. Packets of data that is transported by IP is called __________


a) Datagrams
b) Frames
c) Segments
d) Encapsulate message

Q49. Parameter that is normally achieved through a trailer added to end of frame is
___________
a) Access Control
b) Flow Control
c) Error Control
d) Physical addressing

Q50. DSDV is?


a. Table driven routing protocol
b. On-demand routing protocol
c. Hybrid routing protocol
d. Hierarchical routing protocols
ANSWER KEY:

Unit-V

1. d
2. a.
Explanation : As the bandwidth is low so the protocol overhead and updating
operations etc.
3. a. Problems of location-dependent
4. b. MIo-NFS avoids write conflicts
5. c. HTTP
6. b. client/server system
7. d interoperable
8. b. scalable
9. a. Wireless datagram protocol
10. d wireless control message protocol
11. c.both
12. a. T-DError.ind
13. a. indicating the reason for the error to the higher layer
14. a Wireless transport layer security
15. b. Class 0 provides unreliable message transfer without any result message
16. c. Class 1,2 provide reliable message transfer
17. d. All of this
18. d All of this
19. a. wireless session protocol
20. c Both
21. d All of the above
22. a. Internet layer and application layer
23. d. All of the above
24. c. Slows down
25. a. Slow start
26. a. The exponential growth of the congestion window
27. a. 1
28. a. fast retransmit and fast recovery
29. a. Fast retransmit
30. d. All of the above
31. c. either wireless part or wired part
32. c. Foreign agent
33. d. All of the above
34. a. Proxy
35. b. Snooping TCP
36. a. Mobile TCP
37. c. disconnections
38. c Selective transmission
39. c Segment
40. c MAN
41. c 600 Km
42. a. LAN
43. b Collision
44. a Basic service set
45. b 1895
Explanation: In England, Guglielmo Marconi began his wireless experiments in 1895. On
2 June 1896, he filed his provisional specification of a patent for wireless telegraphy. He
demonstrated the system to the British Post Office in July.
46. a 3 broad groups
Explanation: We can divide wireless transmission into three broad groups: radio waves,
microwaves, and infrared waves. Radio waves are used for multicast communications, such
as AM and FM radio, television, maritime radio, cordless phones and paging systems.
Microwave propagation is line-of-sight.
47. a Four Layers
48. a Datagrams
49. c Error Control
50. a. Table driven routing protocol

You might also like