Professional Documents
Culture Documents
→Telegram Group
1. Which of the following is not a standard used for paging system?
a) POCSAG
b) ERMES
c) IS-95
d) FLEX
Answer: c
Explanation: IS-95 is a standard used for cellular system which is based on code division multiple access (CDMA).
POCSAG (Post Office Code Standard Advisory Group), ERMES (European Radio Messaging System) and FLEX a
re the protocols used in paging system.
a) Full duplex
b) Simplex
c) Half Duplex
d) Duplex
Answer: b
Explanation: Simplex systems communicate in only one way. For the paging systems, messages received are not ack
nowledged and thus they use simplex mode of transmission.
a) Note
b) Line
c) Message
d) Page
Answer: d
Explanation: Page is concise information sent by a paging system to the subscribers of entire service area.
4. Which type of message cannot be sent with the help of paging system?
a) Alphanumeric message
b) Video message
c) Voice message
d) Numeric message
Answer: b
Explanation: The message sent by a paging system can be numeric, alphanumeric or voice depending upon the type
of service.
a) An e mail id
b) A username
c) A toll free telephone number
d) A registration number
Answer: c
Explanation: Paging access number is a telephone number which is used to send the information to the subscriber.
a) Simulcasting
b) Multicasting
c) Unicasting
d) Hybrid
Answer: a
Explanation: Simulcast is a reliable technique used by paging system by transmitting the same paging signal from m
ultiple paging transmitters at approximately equal times.
a) Asymmetric communication
b) Light weight
c) High cost
d) Wide area coverage
Answer: c
Explanation: One of the main reasons for the increased users of paging system was its less cost. But as the prices of
cellular system declined, the users of paging system also decreased.
8. Which of the following properties describes the transmitters and receivers in paging system?
a) High complexity and high power transmitter, high complexity and high power receivers
b) Low complexity and low power transmitter, low complexity and low power receivers
c) Low complexity and low power transmitter, high complexity and high power receivers
d) High complexity and high power transmitter, low complexity and low power receivers
Answer: d
Explanation: High power of transmitters helps paging signal to easily penetrate the building and low power receivers
allow long usage time and light weight batteries.
a) A transmitter
b) A receiver
c) A transceiver
d) An equalizer
Answer: b
Explanation: A pager is a wireless device which receives the page, i.e. numeric, alphanumeric or voice message sent
by the transmitter.
10. Who introduced the paging system for the first time?
a) Al Gross
b) Teri Pall
c) Alexander Graham Bell
d) Martin Cooper
Answer: a
Explanation: AL Gross introduced the first paging system during world war in 1949.
a) PACS
b) ERMES
c) IS-95
d) FLEX
Answer: a
Explanation: PACS (Personal Access Communication System) is a protocol used for cordless telephone system. ER
MES and FLEX are used by paging system. And IS-95 is used for cellular system.
a) 43-50 MHz
b) 88-108 MHz
c) 540-1600 KHz
d) 200-540 KHz
Answer: a
Explanation: Cordless phones mostly operate in the frequency range of 43-50 MHz. The frequency range of FM is 8
8-108 MHz and for AM is 540-1600 KHz.
a) Wireless technology
b) Limited coverage area
c) Mobile
d) Security
Answer: b
Explanation: Cordless telephone systems are wireless, but they have a disadvantage of limited coverage area with ce
ll size of approx. 300 m. Being digital, they have very less chance of eaves dropping.
a) CT0
b) CT1
c) CT1+
d) DECT
Answer: d
Explanation: Digital enhanced cordless telecommunication (DECT) is a fully digital system established in 1991. CT
0, Ct1, Ct1+ were analog systems established in 1980, 1984 and 1987 respectively.
a) GSM
b) Cordless telephone system
c) UMTS
d) EDGE
Answer: b
Explanation: GSM, UMTS and EDGE covers worldwide area whereas cordless system has vey less coverage area.
a) CT-2
b) DECT
c) UMTS
d) PHS
Answer: c
Explanation: CT-2 is a cordless telephone standard used in Europe and Asia. DECT and PHS (Personal Handyphone
System) are cordless telephone standards used in Europe and Japan respectively. UMTS is a cellular system standar
d.
7. What is the range of cell diameter of DECT?
a) 300 m
b) 2 km
c) 10 km
d) 70 km
Answer: a
Explanation: DECT has the cell diameter of 300 m from the base station while GSM is designed for outdoor use wit
h a cell diameter of 70 km.
8. Which of the following standard of cordless telephone system is also approved as a 3G standard?
a) PHS
b) PACS
c) DECT
d) CT2
Answer: c
Explanation: DECT fulfills the IMT 2000 requirements and is approved as a 3G standard by ITU (International Tele
communication Union).
9. Cordless telephone system will not work under which of the following criteria?
a) Within a home
b) Within a building
c) Within campus
d) Within a city
Answer: d
Explanation: Cordless telephones are used in homes, in offices, on campus, at trade shows. But due to their limited c
overage they cannot cover a whole city.
a) Multimedia processing
b) Cordless private branch exchange
c) Wireless local loop
d) Home cordless phones
Answer: a
Explanation: Users in a neighborhood served by a telephone company wired local loop can be connected by a cordle
ss phone that exchanges signals with a neighborhood antenna.
3. Who has the responsibility of billing and system maintenance function in cellular system?
a) Base Station
b) PSTN
c) MSC
d) Mobile system
Answer: c
Explanation: Mobile switching center (MS
c) accommodates 100,000 subscribers and 5,000 simultaneous conversations at a time and handles all billing and sys
tem maintenance functions.
6. Of the total channels present in the cellular system, what is the percentage of voice and control channels?
7. What is MIN?
8. What is transmitted along with the call initiation request during the origin of call by a mobile?
a) MIN
b) ESN
c) ESN and SCM
d) MIN, ESN and SCM
Answer: d
Explanation: When a mobile originates the call, it sends the MIN (mobile identification number), ESN (electronic se
rial number) and SCM (station class mark) along with the call initiation request.
10. What is the shape of the cell present in the cellular system?
a) Circular
b) Square
c) Hexagonal
d) Triangular
Answer: c
Explanation: The shape of the cell present in the cellular network is hexagonal since it can cover the entire geograph
ical area without any gap and overlapping.
11. Why the size of the cell is kept small in cellular network?
a) Increase capacity
b) Decrease capacity
c) Increased size of base station electronics
d) Slow process of handoffs
Answer: a
Explanation: The size of the cells in cellular network is kept small because of the need of high capacity in areas with
high user density and reduced size and cost of base station electronics.
a) Forward channel
b) Switching technique
c) Roamer
d) Guard channel
Answer: b
Explanation: Handoff is a switching technique which refers to the process of transferring an active call or data sessio
n from one cell in a cellular network to another.
a) Increased capacity
b) Limited spectrum is required
c) Same spectrum may be allocated to other network
d) Number of base stations is reduced
Answer: d
Explanation: Frequency reuse is a technique of reusing frequencies and channels within a cellular system to improve
capacity and spectral efficiency.
14. The process of transferring a mobile station from one base station to another is ____________
a) MSC
b) Roamer
c) Handoff
d) Forward channel
Answer: c
Explanation: Handoff is the process of changing the channel associated with current connection while a call is in pro
gress.
15. The interference between the neighbouring base stations is avoided by ____________
1. Which of the following multiple access techniques are used by second generation cellular systems?
a) GSM
b) IS-136
c) AMPS
d) PDC
Answer: c
Explanation: GSM (Global System Mobile), IS-136 (Interim Standard 136) and PDC (Pacific Digital Cellular) are th
e three most popular TDMA standards of second generation. AMPS is a first generation standard.
3. Which of the following is a CDMA standard of second generation network?
a) IS-95
b) IS-136
c) ETACS
d) EDGE
Answer: a
Explanation: Interim Standard 95 (IS-95) is the most popular CDMA standard of second generation networks. IS-13
6 is a TDMA standard of 2G. EDGE is a standard of 2.5G and ETACS is a 1G standard.
a) CdmaOne
b) CdmaTwo
c) IS-136
d) IS-95B
Answer: a
Explanation: The popular 2G CDMA standard, Interim Standard (IS-95) is also known as CdmaOne. The 2.5G CD
MA standard, IS-95B is called CdmaTwo. And IS-136 is a TDMA standard for 2G.
5. How many users or voice channels are supported for each 200 KHz channel in GSM?
a) Eight
b) Three
c) Sixty four
d) Twelve
Answer: a
Explanation: GSM is a circuit switched system that divides each 200 KHz channel into eight 25 KHz time slots, i.e.
each radio channel is divided into eight voice channels.
6. How many voice channels are supported for each 30 KHz radio channel in IS-136?
a) Eight
b) Thirty
c) Three
d) Sixteen
Answer: c
Explanation: Interim Standard 136 (IS-136) was popularly known as North American Digital Cellular (NAD
c) system. It divides each 30 KHz radio channel into three time slots, each of 10 KHz.
7. How many users are supported in IS-95 for each 1.25 MHz?
a) Eight
b) Sixty four
c) Sixteen
d) Twenty five
Answer: b
Explanation: IS-95 supports upto 64 users which are orthogonally coded and simultaneously transmitted on each 1.2
5 MHz. The services of IS-95 standard are short messaging service, slotted paging, over-the-air activation, enhanced
mobile station identities etc.
a) GMSK
b) BPSK
c) QAM
d) AFSK
Answer: b
Explanation: IS- 95 uses BPSK (Binary Phase Shift Keying) with quadrature spreading. It is regarded as one of the
most robust digital modulation technique and is used for long distance wireless communication.
a) π/4 DQPSK
b) BPSK
c) GMSK
d) AFSK
Answer: a
Explanation: IS-136 uses π/4 DQPSK modulation technique. This technique allows a bit rate of 48.6 Kbit/s with 30
KHz channel spacing which gives a bandwidth efficiency of 1.62 bit/s/Hz.
12. GSM (Global System for Mobile) was earlier also known as _____________
a) IS-136
b) GSM
c) PDC
d) AMPS
Answer: c
Explanation: PDC (Personal Digital Cellular) was standardized by Japanese Ministry of Posts and Telecommunicati
on in 1991. It is similar to IS- 136, but with 25 KHz voice channels to be compatible with the Japanese analog chann
els.
a) 1.25 MHz
b) 200 KHz
c) 30 KHz
d) 300 KHz
Answer: b
Explanation: The Global System for Mobile (GSM) uses a carrier separation of 200 KHz, each channel supporting u
pto eight users.
1. What is the name of the web browsing format language supported by 2.5G technology?
2. What is the name of the internet microbrowser technology used by NTT DoCoMo in Japan?
3. 2.5G upgrade path for a particular wireless carrier does not match the original 2G technology choice made earlier
by the same carrier.
a) True
b) False
Answer: b
Explanation: As 2.5G is the upgradation of 2G technology, 2.5G upgradation path must match the original 2G techn
ology. For example, 2.5G upgrade solution designed for GSM must dovetail with original GSM interface so that cha
nge of hardware is not required.
a) HSCSD
b) GPRS
c) EDGE
d) GSM
Answer: d
Explanation: GSM (Global System for Mobile) is a TDMA standard for 2G network. HSCSD (High Speed Circuit S
witched Data), GPRS (General Packet Radio Service) and EDGE (Enhanced Data rates for GSM Evolution) are TD
MA standards of 2.5G technology.
a) IS-95
b) Cdma2000
c) IS-95B
d) CdmaOne
Answer: c
Explanation: IS-95B (Interim Standard 95
b) is code division multiple access standard for 2.5G. It is an upgradation of IS- 95 which is a second generation stan
dard of CDMA.
a) GSM
b) IS-136
c) GSM and IS-136
d) PDC
Answer: a
Explanation: High Speed Circuit Switched Data (HSCD
c) supports the Global system for Mobile (GSM) standard. It only requires a software upgrade at the base station.
7. How does HSCSD differs from the GSM to obtain higher speed data rate?
a) GSM only
b) IS-136 only
c) GSM and IS-136 both
d) PDC
Answer: c
Explanation: GPRS (General Packet Radio Service) network provides a packet network on dedicated GSM or IS-13
6 radio channels. EDGE (Enhanced Data rates for GSM Evolution) is also developed keeping in desire both GSM an
d IS-136 operators.
a) Infrastructure
b) Multiple Access Scheme
c) Modulation technique
d) Switching Technique
Answer: d
Explanation: GPRS is a packet based network. HSCSD dedicates circuit switched channels to specific users whereas
GPRS supports many more users, but in a bursty manner.
10. What changes GPRS need to acquire while upgrading itself from GSM?
a) BPSK
b) 8- PSK
c) DQPSK
d) AFSK
Answer: b
Explanation: EDGE uses a new digital modulation format, 8- PSK (Octal Phase Shift Keying). It is used in addition
to GSM’s standard GMSK (Gaussian Minimum Shift Keying) modulation.
12. Various air interface formats used by EDGE are also known as ___________
a) HSCSD
b) 3GPP
c) EGPRS
d) EGSCSD
Answer: c
Explanation: EDGE is sometimes also referred as Enhanced GPRS (EGPRS). It is an enhancement of a GSM networ
k in which EDGE is introduced on top of the General Packet Radio Service (GPRS). It is used to transfer data in a p
acket switched mode on various time slots.
14. What is one disadvantage of EDGE in comparison to HSCSD and GPRS?
2. What is the term used by ITU for a set of global standards of 3G systems?
a) IMT 2000
b) GSM
c) CDMA
d) EDGE
Answer: a
Explanation: International Telecommunications Union (ITU) used the term IMT-2000 in 1998. It is used for a set of
global standards for third generation (3G) mobile telecoms services and equipment.
a) IS-95
b) IS-95B
c) CdmaOne
d) Cdma2000
Answer: d
Explanation: 3G evolution of CDMA system leads to cdma2000. It is based on the fundamentals of IS-95 and IS-95
B. IS-95 is a 2G standard for CDMA systems. IS-95B is a CDMA system for 2.5G networks.
4. Which of the following leads to the 3G evolution of GSM, IS-136 and PDC systems?
a) W-CDMA
b) GPRS
c) EDGE
d) HSCSD
Answer: a
Explanation: The 3G evolution for GSM, IS-136 and PDC systems leads to W-CDMA (Wideband CDMA). It is bas
ed on the network fundamentals of GSM, as well as merged versions of GSM and IS-136 through EDGE. GPRS, E
DGE and HSCSD are 2.5G networks.
5. What is 3GPP?
6. What is 3GPP2?
a) UMTS
b) Cdma2000
c) TD-SCDMA
d) LTE
Answer: d
Explanation: UMTS (Universal Mobile Telecommunication System), TD-SCDMA (Time Division Synchronous Co
de Division Multiple Access), Cdma2000 are the standards defined for 3G networks. LTE (Long Term Evolution) is
a 4G standard for high speed wireless communication.
a) Cdma2000
b) TD-SCDMA
c) UMTS
d) UTRA
Answer: c
Explanation: Japan uses UMTS (W-CDM
a) standard for its 3G network. The standards used are UMTS 800, UMTS 900, UMTS 1500, UMTS 1700 and UMT
S 2100. They are standardized by ARIB (Association of Radio industries and Business).
a) Year
b) Number of subscribers per cell
c) Number of cells
d) Area (Km)
Answer: a
Explanation: The International Telecommunication Union (ITU) defined the third generation (3G) of mobile telepho
ny standards, IMT-2000 to facilitate growth, increase bandwidth, and support more diverse applications. The numbe
r 2000 in IMT-2000 indicates the start of the system (year 2000) and the spectrum used (around 2000 MHz).
a) CDMA
b) TDMA
c) FDMA
d) SDMA
Answer: a
Explanation: Although UMTS is designed to operate on evolved GSM core networks, it uses code division multiple
access (CDM
a) for its air interface. The majority of the 3G systems in operation employ CDMA, while the rest use TDMA. CDM
A allows various users to share a channel at the same time, while TDMA allows users to share the same channel by
chopping it into different time slots.
a) GSM
b) IS-136
c) IS-95
d) GPRS
Answer: c
Explanation: UMTS assures backward compatibility with the second generation GSM, IS-136 and PDC TDMA tech
nologies. It is also compatible with all 2.5G TDMA techniques like GPRS and EDGE. But it does not provide comp
atibility to CDMA technologies of 2G and 2.5 G. IS-95 is a CDMA standard of 2G.
a) 1.2288 Mcps
b) 3.84 Mcps
c) 270.833 Ksps
d) 100 Mcps
Answer: b
Explanation: W-CDMA uses a chip rate of 3.84 Mcps. Chip rate is the product of symbol rate and spreading factor. I
f the symbol rate is 960 Kbps and spreading factor is 4 for W-CDMA, then the chip rate is 3.84 Mcps. The chip rate
for Cdma2000 and GSM are 1.2288 Mcps and 27.0833 Ksps respectively.
a) True
b) False
Answer: b
Explanation: W-CDMA works in both FDD and TDD mode. W-CDMA developed for wide area cellular coverage u
ses FDD. And TDD is used by W-CDMA for indoor cordless type applications.
a) 2.048 Kbps
b) 100 Mbps
c) 2.048 Mbps
d) 1 Gbps
Answer: c
Explanation: If the user is stationary, W-CDMA supports packet data rates upto 2.048Mbps per user. Thus, it allows
high quality data, multimedia, streaming audio video and broadcast type services to consumers. Future version of W
CDMA will support stationary user data rates in excess of 8Mbps.
7. How much packet data rate per user is supported by W-CDMA if the user is stationary?
a) 5 MHz
b) 20MHz
c) 1.25 MHz
d) 200 KHz
Answer: a
Explanation: W-CDMA/UMTS requires a minimum spectrum allocation of 5 MHz. Using this bandwidth, it has the
capacity to carry over 100 simultaneous voice calls. It is able to carry data at speeds up to 2 Mbps in its original for
mat. 20 MHz is the bandwidth defined for LTE. CdmaOne uses a bandwidth of 1.25 MHz. GSM’s bandwidth is 200
KHz.
a) True
b) False
Answer: a
Explanation: W-CDMA is designed to provide backward compatibility and interoperability for all GSM, IS-136/PD
C, GPRS and EDGE equipment. But due to a wider air interface bandwidth of W-CDMA, it requires a complete cha
nge of RF-equipment at each base station.
a) Two times
b) Three times
c) No increase
d) Six times
Answer: d
Explanation: W-CDMA can provide at least six times an increase in spectral efficiency over GSM at system level. S
uch a wider bandwidth is chosen to higher data rates as low as 8 kbps to as high as 2 Mbps on a single 5 MHz W-C
DMA radio channel.
a) IS-95
b) GPRS
c) IS-95A
d) IS-95B
Answer: b
Explanation: 3G Cdma2000 is based on the original IS-95 and IS-95A CDMA standards, as well as the 2.5G IS-95B
air interface. While upgrading, Cdma2000 maintains backward compatibility with existing IS-95, IS-95A and IS-95
B equipments. Thus, Cdma2000 allow wireless carriers to introduce a family of new high data rate Internet access ca
pabilities within existing systems.
a) True
b) False
Answer: a
Explanation: Cdma2000 does not require change in entire base station or additional RF equipment. All the changes a
re made in software or in baseband hardware.
2. 2G and 2.5G CDMA operators may selectively introduce 3G capabilities at each cell without changing entire base
stations and reallocate spectrums.
a) IS-95
b) IS-95B
c) Cdma2000 1xRTT
d) CdmaOne
Answer: c
Explanation: Cdma2000 1xRTT is the first 3G air interface. Here, RTT stands for Radio Transmission Technology a
nd 1x indicates that the bandwidth is one times that of the original CdmaOne channel. It is modulated on a single car
rier.
a) Half
b) Twice
c) Six times
d) Ten times
Answer: b
Explanation: Cdma2000 support up to twice as many users as the 2G CDMA standard. It also provides the two times
the standby time for longer lasting battery life.
a) True
b) False
Answer: b
Explanation: Cdma2000 works in both FDD and TDD mode. Cdma2000 developed for wide area cellular coverage
uses FDD. And TDD is used by Cdma2000 for indoor cordless type applications.
a) Motorola
b) AT&T Laboratories
c) Qualcomm
d) NTT
Answer: c
Explanation: Cdma2000 is an evolutionary advancement for CDMA. It was developed by Qualcomm Inc. It is a pro
prietary high data rate (HDR) packet standard that can be overlaid upon existing IS-95, IS-95B and Cdma2000 netw
orks.
a) Cdma2000 1xRTT
b) Cdma2000 3xRTT
c) Cdma2000 1xEV-DO
d) Cdma2000 1xEV-DT
Answer: c
Explanation: Cdma2000 1xEV-DO option provides data rates of about 2.4 Mbps and supports data traffic only. No v
oice communication is supported. It relaxes the minimum latency requirement. But this mode is not backward comp
atible with Cdma2000.
2. WLANs use high power levels and generally require a license for spectrum use.
a) True
b) False
Answer: b
Explanation: WLANs use low power and generally do not require a license for spectrum. They provide ad hoc high
data transmission rate connections deployed by individuals. In the late 1980s, FCC provided licence free bands for l
ow power spread spectrum devices in ISM band, which is used by WLAN.
3. What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM band?
a) UNII
b) Unlicensed PCS
c) Millimetre wave
d) Bluetooth
Answer: a
Explanation: FCC allocated 300 MHz of unlicensed spectrum in the ISM bands. This allocation is called the Unlicen
sed National Information Infrastructure (UNII) band. It was allocated for the express purpose of supporting low pow
er license free spread spectrum data communication.
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
Answer: c
Explanation: IEEE 802.11 is a set of media access control and physical layer specification for implementing WLAN
computer communication. It was founded in 1987 to begin standardization of spread spectrum WLANs for use in th
e ISM bands.
a) HIPER-LAN
b) HIPERLAN/2
c) IEEE 802.11b
d) AMPS
Answer: d
Explanation: AMPS is a standard of first generation network. HIPERLAN is a WLAN standard developed in Europe
in mid 1990s. HIPERLAN/2 is also developed in Europe that provides upto 54 Mbps of user data.
a) IEEE 802.15
b) IEEE 802.15.4
c) IEEE 802.11g
d) IEEE 802.11b
Answer: d
Explanation: IEEE 802.11b was a high rate standard approved in 1999. It provided new data rate capabilities of 11
Mbps, 5.5 Mbps in addition to the original 2 Mbps and 1 Mbps user rates of IEEE 802.11.
7. Which of the following spread spectrum techniques were used in the original IEEE 802.11 standard?
a) IEEE 802.6
b) IEEE 802.15.4
c) DSSS IEEE 802.11b
d) IEEE 802.11g
Answer: c
Explanation: The DSSS IEEE 802.11b standard has been named Wi-Fi by the Wireless Ethernet Compatibility Allia
nce. It is a group that promotes adoption of 802.11 DSSS WLAN.
a) IEEE 802.11a
b) IEEE 802.11b
c) IEEE 802.15.4
d) IEEE 802.11g
Answer: d
Explanation: IEEE 802.11g is developing CCK-OFDM (Complementary Code Keying Orthogonal Frequency Divisi
on Multiplexing) standards. It will support roaming capabilities and dual band use for public WLAN networks. It als
o has backward compatibility with 802.11b technologies.
a) 10 Mbps
b) 54 Mbps
c) 200 Mbps
d) 1 Mbps
Answer: a
Explanation: HomeRF 2.0 has data rate of the order of 10 Mbps. The FHSS proponents of IEEE 802.11 have formed
the HomeRF standard that supports the frequency hopping equipment. In 2001, HomeRF developed a 10 Mbps FH
SS standard called HomeRF 2.0.
12. What is the range of asynchronous user data rates provided by HIPER-LAN?
a) 1-100 Mbps
b) 50-100 Mbps
c) 1-20 Mbps
d) 500 Mbps to 1 Gbps
Answer: c
Explanation: HIPER-LAN provides asynchronous user data rates of between 1 to 20 Mbps, as well as time bounded
messaging of rates of 64 kbps to 2.048 Mbps. It uses 5.2 GHz and 17.1 GHz frequency bands.
13. What is the name of the European WLAN standard that provides user data rate upto 54 Mbps?
a) UNII
b) WISP
c) MMAC
d) HIPERLAN/2
Answer: d
Explanation: HIPERLAN/2 has emerged as the next generation European WLAN standard. It provides upto 54 Mbp
s of user data to a variety of networks. The networks includes the ATM backbone, IP based networks and the UMTS
network.
15. The price of WLAN hardware is more than 3G telephones and fixed wireless equipment.
a) True
b) False
Answer: b
Explanation: As, WLAN could be used to provide access for the last 100 meters into homes and businesses. Therefo
re, the price of WLAN hardware is far below 3G telephones and fixed wireless equipment.
a) Bluetooth
b) WWW
c) HTML
d) VPN
Answer: d
Explanation: An open standard is a standard that is publicly available. It has various rights to use associated with it.
Bluetooth is an open standard that has been embraced by over thousand manufacturers of electronic appliances. VP
N (Virtual Private Network) is a private network.
a) 1 Km
b) 10 m
c) 1 m
d) 10 Km
Answer: b
Explanation: The power of the transmitter governs the range over which a Bluetooth device can operate. Generally,
Bluetooth devices are said to fall into one of three classes. The most common kind is class 2, and it operates in 10 m
range.
a) Ka Band
b) L Band
c) Ku Band
d) 2.4 GHz ISM Band
Answer: d
Explanation: Bluetooth is a radio technology operating in 2.4 GHz frequency band. Bluetooth is best suited for low-
bandwidth applications like transferring sound data with telephones (i.e. with a Bluetooth headset) or byte data with
hand-held computers (transferring files) or keyboard.
a) 120 milliseconds
b) 625 microseconds
c) 577 microseconds
d) 5.7 seconds
Answer: b
Explanation: Bluetooth uses a timeslot of 625 microseconds. A data channel hops randomly 1600 times per second b
etween 79 RF channels. Thus, each channel is divided into time slots 625 microseconds.
a) DQPSK
b) MSK
c) GFSK
d) BPSK
Answer: c
Explanation: Bluetooth uses GFSK (Gaussian Frequency Shift Keying). When GFSK is used for Bluetooth modulati
on, the frequency of the carrier is shifted to carry the modulation. By doing this the Bluetooth modulation achieves a
bandwidth of 1 MHz with stringent filter requirements to prevent interference on other channels.
a) 270.833 Kbps
b) 1 Gbps
c) 100 Mbps
d) 1 Mbps
Answer: d
Explanation: Each user in Bluetooth uses a radio channel symbol rate of 1 Mbps using GFSK modulation. The frequ
ency hopping scheme of each Bluetooth user is determined from a cyclic code with a length of 1027-1.
a) 10-3
b) 10-10
c) 103
d) 10-1
Answer: a
Explanation: Bluetooth has a bit error rate (BER) of 10-3. Bluetooth uses a number of forward error control (FE
c) coding and automatic repeat request (ARR) schemes to achieve this bit rate.
10. Which of the following standard committee specifies Bluetooth and other Personal Area Networks (PAN)?
a) IEEE 802.11b
b) IEEE 802.15
c) IEEE 802.11g
d) IEEE 802.16
Answer: b
Explanation: IEEE 802.15 standards committee is formed to provide an international forum for developing Bluetoot
h and other PANs. PANs are used to interconnect pocket PCs, personal digital assistants (PDAs), cell phones, light p
rojectors and other appliances.
1. Cellular concept replaces many low power transmitters to a single high power transmitter.
a) True
b) False
Answer: b
Explanation: Cellular concept is a system level idea that replaces a single high power transmitter to many low power
transmitters. High power transmitters lead to large cell, and thus it was impossible to use the same frequencies throu
ghout the systems. But, it is possible with low power transmitter.
2. Why neighbouring stations are assigned different group of channels in cellular system?
a) To minimize interference
b) To minimize area
c) To maximize throughput
d) To maximize capacity of each cell
Answer: a
Explanation: Neighbouring base stations are assigned different group of channels. It minimizes the interference betw
een base stations and the users under their control.
a) A group of cells
b) A group of subscribers
c) A small geographical area
d) A large group of mobile systems
Answer: c
Explanation: Cell is a small geographic area in a cellular system. Each cellular base station within a cell is allocated
a group of radio channels that could be used in another cell.
a) Square
b) Circle
c) Triangle
d) Hexagon
Answer: d
Explanation: Hexagonal cell shape is a simplistic model of radio coverage for each base station. It has been universa
lly adopted since the hexagon permits easy and manageable analysis of a cellular system.
a) Fingerprint
b) Footprint
c) Imprint
d) Matrix
Answer: b
Explanation: Actual radio coverage of a cell is known as the footprint. It is determined from field measurements or p
ropagation prediction models. Although the real footprint is amorphous in nature, a regular cell shape is needed for s
ystematic system design.
a) Omni directionality
b) Small area
c) Overlapping regions or gaps are left
d) Complex design
Answer: c
Explanation: Circle is the first natural choice to represent the coverage area of a base station. But while adopting this
shape, adjacent cells cannot be overlaid upon a map without leaving gaps or creating overlapping regions.
8. What is the main reason to adopt hexagon shape in comparison to square and triangle?
a) Largest area
b) Simple design
c) Small area
d) Single directional
Answer: a
Explanation: For a given distance between the center of a polygon and its farthest perimeter points, the hexagon has
the largest area. Thus, by using the hexagon geometry, the fewest number of cells can cover a geographic region.
a) Omnidirectional antenna
b) Grid antenna
c) Sectored directional antenna
d) Dipole antenna
Answer: c
Explanation: For edge excited cell, mostly base station transmitters are placed on three of the six cell vertices. To co
ver the assigned portion of a cell, sectored directional antenna is the best choice.
11. For a cellular system, if there are N cells and each cell is allocated k channel. What is the total number of availab
le radio channels, S?
a) S=k*N
b) S=k/N
c) S=N/k
d) S=kN
Answer: a
Explanation: If there is a cellular system with total of S duplex channels. Each cell is allocated a group of k channels
and there are total N cells in the system, S channels are divide among N cells into unique and disjoint channel group
s. Therefore, total number of radio channel is the product of total number of cells in the system (N) and number of c
hannel allocated to each cell (k).
a) Group of frequencies
b) Group of cells
c) Group of subscribers
d) Group of mobile systems
Answer: b
Explanation: Cluster is group of N cells. These cells use the complete set of frequency available for the cellular syste
m at that location.
a) N
b) N2
c) 2*N
d) 1/N
Answer: d
Explanation: The frequency reuse factor is defined as 1 over the number of cells in the cluster of the system (N). It is
given by 1/N since each cell within a cluster is only assigned 1/N of the total available channels in the system.
15. A spectrum of 30 MHz is allocated to a cellular system which uses two 25 KHz simplex channels to provide full
duplex voice channels. What is the number of channels available per cell for 4 cell reuse factor?
a) 150 channels
b) 600 channels
c) 50 channels
d) 85 channels
Answer: a
Explanation: Total bandwidth is 30 MHz. And the channel bandwidth is 50 KHz/duplex channel (25KHz*2). Theref
ore, total available channels are 600 channels (30,000/50). For 4 cell reuse factor, total number of channels available
per cell will be 150 channels (600/4).
2. The choice of channel assignment strategy does not impact the performance of the system.
a) True
b) False
Answer: b
Explanation: The choice of channel assignment strategy impacts the performance of the system. Particularly as to ho
w calls are managed, when a mobile user is handed off from one cell to another.
3. In fixed channel assignment strategy, each cell is allocated a predetermined set of _______
a) Voice channels
b) Control channels
c) Frequency
d) base stations
Answer: a
Explanation: In a foxed channel strategy, each cell is allocated a predetermined set of voice channels. Any call attem
pt within the cell can only be served by the unused channels in that particular cell.
4. What happen to a call in fixed channel strategy, if all the channels in a cell are occupied?
a) Queued
b) Cross talk
c) Blocked
d) Delayed
Answer: c
Explanation: As any call attempt within a cell can be served by unused channels in fixed channel strategy. If all the c
hannels in that cell are occupied, the call is blocked and subscriber does not receive any service.
6. In dynamic channel assignment strategy, voice channels are allocated to different cells permanently.
a) True
b) False
Answer: b
Explanation: In a dynamic channel strategy, voice channels are not allocated to different cells permanently. Instead,
serving base station requests a channel from MSC each time a cell request is made.
7. In dynamic channel assignment strategy, base station requests channel from ____________
a) MSC
b) Neighbouring cell
c) Neighbouring cluster
d) Neighbouring base station
Answer: a
Explanation: Each time a call request is made, the serving base station requests a channel from the MSC. The switch
then allocates a channel to the requested cell following an algorithm that takes into account the likelihood of future
blocking within the cell.
8. Dynamic channel assignment reduces the likelihood of blocking in comparison to fixed channel assignment.
a) True
b) False
Answer: a
Explanation: Dynamic channel assignment reduces the likelihood of blocking. Accordingly, the MSC only allocates
a given frequency if that frequency is not presently in use in the cell or any other cell which falls within the minimu
m restricted distance of frequency reuse.
2. Handoff does not require voice and control channel to be allocated to channels associated with the new base statio
n.
a) True
b) False
Answer: b
Explanation: Handoff operation involves identifying a new base station. It also requires that the voice and control si
gnal be allocated to channels associated with the new base station.
3. The time over which a call can be maintained within a cell without handoff is called _________
a) Run time
b) Peak time
c) Dwell time
d) Cell time
Answer: c
Explanation: The time over which a call is maintained within a cell without handoff is called as dwell time. Dwell ti
me vary depending on speed of user and type of radio coverage.
a) Propagation
b) Interference
c) Distance between subscriber and base station
d) Mobile station
Answer: d
Explanation: Dwell time of a particular user is governed by a number of factors. They include propagation, interfere
nce, distance between the subscriber and the base station, and other time varying effects.
5. Which of the following is associated with the handoff in first generation analog cellular systems?
a) Locator receiver
b) MAHO
c) Cell dragging
d) Breathing cell
Answer: a
Explanation: Locator receiver is a spare receiver in each base station. It is used to scan and determine signal strength
s of mobile users which are in neighbouring cells.
7. A handoff is initiated when the power received from the base station of a neighbouring cell falls behind the power
received from the current base station by certain level.
a) True
b) False
Answer: b
Explanation: MAHO measures the power received from the surrounding base station. And a handoff is initiated whe
n the power received from the base station of a neighbouring cell begins to exceed the power received from current
base station.
10. Which of the following priority handoff method decrease the probability of forced termination of a call due to la
ck of available channels?
a) Queuing
b) Guard channel
c) Cell dragging
d) Near far effect
Answer: a
Explanation: Queuing of handoff requests is a method to decrease the probability of forced termination of a call due
to lack of available channels. Queuing of handoff is possible due to the fact that there is a finite time interval betwee
n the time the received signal level drops below the handoff threshold and the time the call is terminated.
a) Pedestrian users
b) Stationary users
c) High speed mobile systems
d) Base stations having same frequency
Answer: a
Explanation: Cell dragging is a practical handoff problem in microcell system. It results from pedestrian users that p
rovide a very strong signal to the base station.
13. What was the typical handoff time in first generation analog cellular systems?
a) 1 second
b) 10 seconds
c) 1 minute
d) 10 milliseconds
Answer: b
Explanation: In first generation analog cellular system, the typical time to make a handoff once the signal level is bel
ow the threshold, is about 10 seconds. This requires the value for threshold to be 6 dB to 12 dB.
14. How much time it takes for handoff in digital cellular systems like GSM?
a) 1 second
b) 10 seconds
c) 1 minute
d) 10 milliseconds
Answer: a
Explanation: In digital cellular systems, the mobile assista with the handoff procedure by determining the best candi
date. Once the decision is made, it typically requires 1 to 2 seconds for handoff.
15. Soft handoff is also known as _________
a) MAHO
b) Hand over
c) Break before make
d) Make before break
Answer: d
Explanation: Soft handoff is one in which the channel in the source cell is retained and used for a while in parallel w
ith the channel in the target cell. In this case, the connection with the receiver target is established before the connect
ion to the source is broken, hence this handover is called make-before-break.
a) Blocked calls
b) Cross talk
c) Queuing
d) Missed calls
Answer: b
Explanation: Interference on voice channels causes crass talk. Here, the subscriber hears interference in the backgro
und due to an undesired transmission.
a) Cross talk
b) Queuing
c) Blocked calls
d) Voice traffic
Answer: c
Explanation: On control channels, interference leads to missed and blocked calls. This happens due to errors in the d
igital signalling.
a) True
b) False
Answer: a
Explanation: Interference is more severe in rural areas. It happens due to the greater RF noise floor and the large nu
mber of base stations and mobiles.
5. What are co-channel cells?
a) Radius of cell
b) Transmitted power
c) Received power
d) Frequency of mobile user
Answer: a
Explanation: This is the case when the size of each cell is approximately the same and the base stations transmit the
same power. Co-channel interference ratio is independent of the transmitted power and becomes a function of the ra
dius of the cell ® and the distance between centers of the nearest co channel cell (D).
a) Q=D*R
b) Q=D/R
c) Q=D^R
d) Q=1/R
Answer: b
Explanation: Co-channel reuse ratio is defined by Q=D/R. By increasing the ratio of D/R, the spatial separation betw
een co-channel cells relative to the coverage distance of a cell is increased. Thus, interference I reduced from improv
ed isolation of RF energy from the co-channel cells.
a) \\(\\sqrt{(3N)}\\)
b) N
c) 3N
d) √N
Answer: a
Explanation: Co-channel reuse is defined using \\(\\sqrt{(3N)}\\). A small value of Q provides larger capacity since t
he cluster size N is small. However, a large value of Q improves the transmission quality, due to smaller level of co-
channel interference.
a) N=10
b) N=100
c) N=1
d) N=50
Answer: c
Explanation: CDMA systems have a cluster size of N=1.Therefore, frequency reuse is not as difficult as for TDMA
or first generation cellular systems.
12. Which of the following problem occur due to adjacent channel interference?
a) Blocked calls
b) Cross talk
c) Near-far effect
d) Missed calls
Answer: c
Explanation: One of the main problems with adjacent channel interference is the near-far effect. It occurs when a mo
bile close to a base station transmits on a channel close to one being used by a weak mobile.
15. In dynamic channel assignment, any channel which is being used in one cell can be reassigned simultaneously to
another cell in the system at a reasonable distance.
a) True
b) False
Answer: a
Explanation: Dynamic channel assignment (DC
a) is one well known solution to the micro cellular channel assignment problem. The dynamic nature of the strategy
permits adaptation to spatial and traffic variations while the distribution of control reduces the required computation
al load.
1. What is the concept for accommodating a large number of users in a limited radio spectrum?
a) Grade of service
b) Trunking
c) Multiplexing
d) Multitasking
Answer: b
Explanation: Cellular radio systems rely on trunking to accommodate a large number of users in a limited radio spec
trum. The concept of trunking allows a large number of users to share the relatively small number of channels in a c
ell by providing access to each user, on demand.
2. On termination of call, the occupied channel is not returned to the pool of available channels in trunking.
a) True
b) False
Answer: b
Explanation: In a trunked radio system, each user is allocated a channel on a per call basis. Upon termination of the
call, the previously occupied channel is immediately returned to the pool of available channels. It is a method for a s
ystem to provide network access to many clients by sharing a set of lines or frequencies instead of providing them in
dividually.
3. In trunking system, when the channel is already in use, the call is blocked or queued.
a) True
b) False
Answer: a
Explanation: In a trunked mobile radio system when a particular user requests service, there is a possibility that all t
he channels are already in use. Then the user is blocked, or denied access to the system. Sometimes, a queue may be
used to hold the requesting users until a channel becomes available.
a) Newton
b) Ohm
c) Erlang
d) Einstein
Answer: c
Explanation: The fundamentals of trunking theory were developed by Erlang. He was a Danish mathematician. He e
mbarked on the study of how a large population could be accommodated by a limited number of servers in late 19th
century.
7. What is the measure of the ability of user to access a trunked system during the busiest hour?
a) Trunking
b) Grade of Service (GOS)
c) Multiplexing
d) Sectoring
Answer: b
Explanation: The grade of service (GOS) is a measure of the ability of a user to access a trunked system during the b
usiest hour. The busy hour is based upon customer demand at the busiest hour during a week, month or a year.
a) Call is in progress
b) Channels are busy
c) Call is blocked
d) Channel are free
Answer: c
Explanation: GOS is typically given as the likelihood that a call is blocked or the likelihood of a call experiencing a
delay greater than a certain queuing time. It is the wireless designer’s job to estimate the maximum required capacity
used to allocate the proper number of channels in order to meet GOS.
9. The time requires to allocate a trunked radio channel to a requesting user is called _______
a) Dwell time
b) Holding time
c) Run time
d) Set up Time
Answer: d
Explanation: When any user makes a call request, the time required to allocate a trunked channel to a user is known
as set up time. TETREA (Terrestrial Trunked Radio) call set up time is 0.3 seconds. GSM uses a call set up time of s
everal seconds.
11. The average number of call requests per unit time is also known as ________
a) Request rate
b) Load
c) Grade o Service
d) Traffic intensity
Answer: a
Explanation: Request rate is the average number of call requests per unit time. It is denoted by λ. Unit for request rat
e is second-1. It can also be defined as the ratio of traffic intensity of each user and the holding time.
a) 10%
b) 50 %
c) 2%
d) 1%
Answer: c
Explanation: The AMPS (Advanced Mobile Phone System) cellular system is designed for a GOS of 2% blocking.
This implies that the channel allocations for cell sites are designed so that 2 out of 100 calls will be blocked due to c
hannel occupancy during the busiest hour.
a) Erlang C
b) Erlang A
c) Erlang D
d) Erlang B
Answer: d
Explanation: Erlang B formula is also known as the blocked calls cleared formula. The Erlang B formula determines
the probability that a call is blocked. And, it is a measure of the GOS for a trunked system which provides no queui
ng for blocked calls.
1. Which of the following techniques do not help in expanding the capacity of cellular system?
a) Sectoring
b) Scattering
c) Splitting
d) Microcell zone concept
Answer: b
Explanation: As the demand for wireless service increases, the number of channels assigned to a call eventually bec
omes insufficient to support the required number of user. Techniques such as cell splitting, sectoring and coverage z
one approaches are used in practice to expand the capacity of cellular system.
a) Sectoring
b) Cell splitting
c) Repeaters
d) Micro cell zone concept
Answer: a
Explanation: Sectoring uses directional antenna to further control the interference and frequency reuse of channels.
By decreasing the cell radius R and keeping the co-channel reuse ratio D/R unchanged, cell splitting increases the nu
mber of channels per unit area.
a) Sectoring
b) Scattering
c) Cell splitting
d) Micro cell zone technique
Answer: c
Explanation: Cell splitting allows an orderly growth of cellular system. By defining new cells which have a smaller r
adius than the original cells, capacity increases due to additional number of channels per unit area.
4. Which of the following technology distributes the coverage of the cell and extends the cell boundary to hard-to-re
ach places?
a) Cell splitting
b) Scattering
c) Sectoring
d) Micro cell zone concept
Answer: d
Explanation: Micro cell zone concept distributes the coverage of the cell and extends the cell boundary to hard-to re
ach places. It is the solution for the problem of increased number of handoffs when sectoring which results in an incr
ease of load on switching.
5. Which of the following increases the number of base stations in order to increase capacity?
a) Cell splitting
b) Sectoring
c) Repeaters
d) Micro cell zone concept
Answer: a
Explanation: Cell splitting increases the number of base stations in order to increase capacity. Whereas, sectoring an
d zone microcells rely on base station antenna placements to improve capacity by reducing co-channel interference.
a) Cell splitting
b) Micro cell zone technique
c) Sectoring
d) Repeaters
Answer: c
Explanation: Sectored cells experience trunking inefficiencies. Cell splitting and zone micro cell techniques do not s
uffer the trunking inefficiencies experienced by sectored cells. They enable the base station to oversee all handoff ch
ores related to microcells, thus reducing the computational load at MSC.
7. The process of subdividing a congested cell into smaller cells is called _______
a) Cell splitting
b) Sectoring
c) Micro cell technique
d) Repeaters
Answer: a
Explanation: Cell splitting is the process of subdividing a congested cell into smaller cells. Each small cell has its o
wn base station and a there is a corresponding reduction in antenna height and transmitter power.
8. Cell splitting increases the capacity of a cellular system since it increases the number of times ________ are reuse
d.
a) Cells
b) Channels
c) Transmitters
d) Mobile stations
Answer: b
Explanation: Cell splitting increases the capacity of a cellular system since it increases the number of times channels
are reused. But it has a limitation that handoffs are more frequent and channel assignments become more difficult.
a) True
b) False
Answer: b
Explanation: Cell splitting allows a system to grow by replacing large cells with smaller cells. It does not upset the c
hannel allocation scheme required to maintain the minimum co channel reuse ratio Q between co-channel cells.
10. Which of the following technique is used to limit radio coverage of newly formed microcells?
a) Sectoring
b) Splitting
c) Antenna downtilting
d) Scattering
Answer: c
Explanation: Antenna downtilting deliberately focuses radiated energy from the base station toward the ground (rath
er than toward the horizon). It is often used to limit the radio coverage of newly formed microcells.
a) True
b) False
Answer: a
Explanation: Sectoring increases SIR so that cluster size may be reduced. SIR is improved using directional antenna.
And then capacity improvement is achieved by reducing the number of cells in a cluster, thus increasing the frequen
cy reuse.
a) Sectoring
b) Repeaters
c) Scattering
d) Micro cell zone concept
Answer: b
Explanation: Wireless operator needs to provide dedicated coverage for hard-to-reach areas, such as within buildings
, or in valleys or tunnels. Radio transmitters used to provide such range extension capabilities are called as repeaters.
They are bidirectional in nature.
a) Frequency
b) Channels
c) Power
d) Repeater noise and interference
Answer: d
Explanation: Upon receiving signals from a base station forward link, the repeater amplifies and reradiates the base s
tation signals to the specific coverage region. Unfortunately, the received noise and interference is also reradiated by
repeater on both the forward and reverse link.
14. Which of the following is not an advantage of micro cell zone technique?
15. In a micro cell zone concept, when a mobile travels from one zone to another within the cell, it retains the same
_________
a) Power level
b) Base station
c) Channel
d) Receiver
Answer: c
Explanation: As a mobile travels from one zone to another within the cell, it retains the same channel. Thus, unlike i
n sectoring, a handoff is not required at the MSC when the mobile travels between zones within the cell. The channe
ls are re used in co channel cells in a normal fashion.
a) Reflection
b) Diffraction
c) Scattering
d) Sectoring
Answer: d
Explanation: The mechanisms behind electromagnetic wave propagation are diverse. They can be greatly attributed t
o reflection, diffraction and scattering. Due to multiple reflections from various objects, the electromagnetic waves t
ravel along different paths of varying lengths.
2. The propagation model that estimates radio coverage of a transmitter is called ___________
a) Hata model
b) Fading model
c) Large scale propagation model
d) Okumura model
Answer: b
Explanation: Fading models characterize the rapid fluctuations of the received signal strength over very short travel
distance (a few wavelengths) or shot time durations (on the order of seconds).
a) Fading model
b) Micro scale propagation model
c) Okumura model
d) Hata model
Answer: a
Explanation: Small scale propagation model is also called fading model. Fading model characterize the rapid fluctua
tions of the received signal strength over very short distance of a few wavelengths or short time duration. The propa
gation models are used to estimate the performance of wireless channels.
5. Free space propagation model is to predict ______
7. The free space model predicts that received signal decays as a function of _________
a) G=(4πAe)/λ2
b) G=(4π λ2)/Ae
c) G=4πAe
d) G=Ae/λ2
Answer: a
Explanation: The gain of the antenna is proportional to effective aperture area. Therefore, antennas with large effecti
ve apertures are high gain antennas and have small angular beam widths. Most of their power is radiated in a narrow
beam in one direction, and little in other directions.
a) λ=c/f
b) λ=c*f
c) λ=f/c
d) λ=1/f
Answer: a
Explanation: Wavelength is inversely proportional to carrier frequency. For electromagnetic radiation in free space,
wavelength is a ratio of speed of light (
c) and carrier frequency (f). Speed of light is 3*108 m/s. The unit for wavelength is meters.
10. Which of the following antenna radiates power with unit gain uniformly in all directions?
a) Directional antenna
b) Dipole antenna
c) Isotropic antenna
d) Loop antenna
Answer: c
Explanation: Isotropic antenna radiates the power with unit gain uniformly in all directions. It is an ideal antenna. Fr
om practical point of view, there is no actual isotropic antenna. But, an isotropic antenna is often used as a reference
antenna for the antenna gain.
a) 2D2/λ
b) 2D/λ
c) D/λ
d) 2D/λ2
Answer: a
Explanation: Fraunhofer distance, also known as far field distance is inversely proportional to wavelength. It depend
s on the largest physical dimension of the antennal (D). This distance basically denotes the boundary between far fiel
d and near field region.
a) Dipole antenna
b) Directional antenna
c) Isotropic antenna
d) Loop antenna
Answer: c
Explanation: Isotropic antenna is an ideal antenna that directs the power uniformly in all directions. It is a theoretical
point source of electromagnetic. It is practically not possible. It is mainly used as a hypothetical antenna to measure
the gain.
1. Which of the following mechanism do not impact propagation in mobile communication system?
a) Reflection
b) Diffraction
c) Scattering
d) Refraction
Answer: d
Explanation: Reflection, diffraction and scattering are the three basic propagation mechanism which impact propaga
tion in mobile communication system. Large scale propagation model and small scale fading and multipath propagat
ion are described by the physics of reflection, diffraction and scattering.
2. What is the dimension of object as compared to wavelength of propagating wave when reflection occurs?
a) Large
b) Small
c) Same
d) Very small
Answer: a
Explanation: Reflection occurs when a propagating electromagnetic wave impinges upon an object which has very l
arge dimensions when compared to the wavelength of the propagation wave. Reflection occurs from the surface of t
he Earth and from buildings and walls.
3. When does the wave propagating from one medium to another gets partially reflection and partially transmitted?
4. What is the case of reflection, in course of second medium being a perfect dielectric?
5. What is the case of reflection, in course of second medium being a perfect conductor?
6. Which of the following relates the incident and reflected & transmitted wave?
a) Material property
b) Diffraction loss
c) Wave polarization
d) Angle of incidence
Answer: b
Explanation: The reflection coefficient is a function of the material properties, and generally depends upon the wave
polarization, angle of incidence and frequency of propagating waves. It is a parameter that describes how much of a
n electromagnetic wave is reflected by an impedance discontinuity in the transmission medium.
a) True
b) False
Answer: b
Explanation: The plane of incidence is defined as the plane containing the incident, reflected and transmitted waves.
The incident light is polarized with its electric field perpendicular to the plane containing the incident, reflected, and
refracted rays.
10. Permittivity and conductivity are insensitive to ______ for a good conductor.
a) Operating frequency
b) Polarization density
c) Electric field
d) Property of material
Answer: a
Explanation: The terms permittivity and conductivity are insensitive to operating frequency when the material is a g
ood conductor. In the case of conductors, it is evident that electric field inside a conductor is zero. That is because fr
ee charges reside only on the surface of conductor and not inside.
a) 1/√(μ )
b) μ/
c) 1/(μ )
d) μ
Answer: a
Explanation: For a medium with permittivity, and permeability, μ the velocity of electromagnetic wave is given b
y 1/√(μ ). It is also known as phase velocity. The velocity of light is given by 3*108 m/s.
a) Kepler’s law
b) Gauss law
c) Faraday law
d) Snell’s law
Answer: d
Explanation: Snell’s law is also known as Snell–Descartes law or the law of refraction. It gives a formula to describe
the relationship between the angles of incidence and refraction, when referring to light or other waves passing throu
gh a boundary between two different isotropic media, such as water, glass, or air.
13. The angle at which no reflection occurs in the medium of origin is called _________
a) Azimuth angle
b) Elevation angle
c) Brewster angle
d) Inclination angle
Answer: c
Explanation: The Brewster angle is the angle at which no reflection occurs in the medium of origin. It occurs when t
he incident angle is such that the reflection coefficient is equal to zero. The critical Brewster’s angles for diamond, g
lass and water are 67.5°, 57° and 53° respectively.
1. Diffraction occurs when radio path between Tx. And Rx. Is obstructed by ____________
a) Continuous surface
b) Smooth surface
c) Curved surface of Earth
d) Does not allow propagation
Answer: c
Explanation: Diffraction allows radio signals to propagate around the curved surface of the Earth. Signals can propa
gate beyond the horizon and to propagate behind obstruction. It is the slight bending of light as it passes around the e
dge of an object.
a) Principle of Simultaneity
b) Pascal’s Principle
c) Archimedes’ Principle
d) Huygen’s principle
Answer: d
Explanation: The phenomenon of diffraction can be explained by Huygen’s principle. It states that all points on a wa
vefront can be considered as point sources for the production of secondary wavelets. And these wavelets combine to
produce a new wavefront in direction of propagation.
a) Bright region
b) Shadowed region
c) Smooth region
d) Large region
Answer: b
Explanation: Diffraction is caused due to propagation of secondary wavelets into a shadowed region. The field stren
gth in the shadowed region is the vector sum of the electric field components of all the secondary wavelets in the spa
ce around the obstacle.
6. Difference between the direct path and the diffracted path is called _______
a) Average length
b) Radio path length
c) Excess path length
d) Wavelength
Answer: c
Explanation: Excess path length denoted by ∆, is the difference between the direct path and the diffracted path. It is
calculated with the help of Fresnel zone geometry.
7. The phase difference between a direct line of sight path and diffracted path is function of _______
a) Principle of Simultaneity
b) Pascal’s Principle
c) Fresnel zone
d) Archimedes’ Principle
Answer: c
Explanation: The concept of diffraction loss is a function of the path difference around an obstruction. It can be expl
ained by Fresnel zones. Fresnel zones represent successive regions where secondary waves have a path length from
Tx to Rx which are nλ/2 greater than total path length.
a) Dielectric medium
b) Obstruction
c) Electric field
d) Operating frequency
Answer: b
Explanation: Diffraction loss occurs from the blockage of secondary waves such that only a portion of the energy is
diffracted around an obstacle. An obstruction causes a blockage of energy from source some of the Fresnel zones, all
owing only some of the transmitted energy to reach the receiver.
10. For predicting the field strength in a given service area, it is essential to estimate ______
a) Polarization
b) Magnetic field
c) Height of transmitter
d) Signal attenuation
Answer: d
Explanation: Estimating the signal attenuation caused by diffraction of radio waves over hills and buildings is essent
ial in predicting the field strength in a given service area. In practice, prediction is a process of theoretical approxima
tion modified by necessary empirical corrections.
1. Scattering occurs when medium consists of objects with dimensions _______ compared to the wavelength.
a) Same
b) Small
c) Large
d) Very large
Answer: b
Explanation: Scattering occurs when the medium through which the wave travels consists of objects with dimension
s that are small compared to the wavelength. But the number of obstacles per unit volume is large.
a) Rough surface
b) Shadowed region
c) Smooth surface
d) Horizon
Answer: a
Explanation: Scattered waves are produced by rough surfaces, small objects or by other irregularities in the channel.
In practice, foliage, street signs, and lamp posts induce scattering in a mobile communication system.
3. The actual received signal is ______ than what is predicted by reflection and diffraction model.
a) Weaker
b) Equal
c) Stronger
d) Very weak
Answer: c
Explanation: The actual received signal in a mobile radio environment is often stronger than what is predicted by ref
lection and diffraction model alone. This is because when a radio wave incidence upon the rough surface, reflected e
nergy is spread out in all directions.
a) Channels
b) Loss of signal
c) No energy
d) Additional radio energy
Answer: d
Explanation: Objects such as lamp posts and trees tend to scatter energy in all directions. They provide additional ra
dio energy at a receiver. Scattering may also refer to particle-particle collisions between molecules, atoms, electrons,
photons and other particles.
a) Rayleigh criterion
b) Lawson criterion
c) Barkhausen stability criterion
d) Nyquist criterion
Answer: a
Explanation: Rough surface is often tested using a Rayleigh criterion. It defines the critical height of surface protube
rances for a given angle of incidence. The Rayleigh criterion is the criterion for the minimum resolvable detail. The i
maging process is said to be diffraction-limited when the first diffraction minimum of the image of one source point
coincides with the maximum of another.
a) Equal
b) Less
c) Greater
d) No relation
Answer: c
Explanation: A surface is considered rough if its minimum to maximum protuberance is greater than the critical heig
ht calculated using Rayleigh criterion. It is considered smooth if protuberance is less than critical height.
8. Which equation is used to calculate the received power due to scattering for urban mobile radio system?
a) Laplace equation
b) Bistatic radar equation
c) Poisson’s equation
d) Maxwell equation
Answer: b
Explanation: For urban mobile radio systems, models based on bistatic radar equation is used to compute the receive
d power due to scattering in the far field. This equation describes the propagation of wave in free space which impin
ges on a scattering object and then reradiated in the direction of receiver.
9. In ionosphere propagation, waves arriving at the receiving antenna using the phenomenon of _______
a) Scattering
b) Refraction
c) Diffraction
d) Radiation
Answer: a
Explanation: Scattering is a general physical process where some forms of radiation, such as light, sound, or moving
particles, are forced to deviate from a straight trajectory by one or more paths. It is due to localized non-uniformitie
s in the medium through which they pass.
10. Power density is basically termed as ________ power per unit area.
a) Reflected
b) Refracted
c) Radiated
d) Diffracted
Answer: c
Explanation: Power density is the amount of power (time rate of energy transfer) per unit volume. It is also termed a
s radiated power per unit area. In energy transformers including batteries, fuel cells, motors, etc., power density refer
s to a volume. It is then also called volume power density.
a) True
b) False
Answer: a
Explanation: The empirical approach is based on fitting curves or analytical expressions that recreate a set of measur
ed data. This has the advantage of implicitly taking into account all propagation factors, both known and unknown t
hrough actual field measurements.
a) Exponentially
b) Logarithmically
c) Two times
d) Four times
Answer: b
Explanation: Both theoretical and measurement based propagation models indicate that average received signal pow
er decreases logarithmically with distance. It is valid for both outdoor and indoor channels.
5. The reference distance should not be in the far field of the antenna.
a) True
b) False
Answer: b
Explanation: It is important to select a free space reference distance that is appropriate for the propagation environm
ent. The reference distance should always be in the far field of the antenna so that near field effects do not alter the r
eference path loss.
7. Log normal shadowing is a phenomenon that occurs with same T-R separation having same level clutter on the pr
opagation path.
a) True
b) False
Answer: b
Explanation: Log normal shadowing occurs over a large number of measurement locations which have the same T-R
separation, but have different levels of clutter on the propagation path. It follows log normal distribution.
8. Log normal shadowing implies that measured signal levels at specific T-R separation have ______ distribution w
hen signal levels have values in dB units.
a) Rayleigh
b) Gamma
c) Gaussian
d) Nakagami
Answer: c
Explanation: Log normal shadowing implies that measured signal levels at a specific T-R separation have Gaussian (
Normal) distribution. It is about the distance dependent mean of 4.68 where the signal levels have values in dB units
.
a) Losses
b) Physical aperture to effective aperture
c) Signal power to noise power
d) Effective aperture to physical aperture
Answer: d
Explanation: The larger the antenna aperture the larger is the resulting signal power density in the desired direction.
The ratio of effective aperture to the physical aperture is the antenna’s efficiency.
a) Longley-Rice model
b) Ericson Multiple Breakpoint Model
c) Hata model
d) Okumura model
Answer: b
Explanation: Ericson multiple breakpoint model is an indoor propagation model. Longley-Rice, Hata and Okumura
model are outdoor propagation models. Most of these models are based on a systematic interpretation of measureme
nt data obtained in the service area.
a) Okumura model
b) Hata model
c) ITS irregular terrain model
d) Bertoni model
Answer: c
Explanation: The Longley Rice prediction model is also referred to as ITS irregular terrain model. The model is base
d on electromagnetic theory and on statistical analyses of both terrain features and radio measurements. It predicts th
e median attenuation of a radio signal as a function of distance and the variability of the signal in time and in space.
4. The extra term for additional attenuation due to urban clutter near the receiving antenna is called __________
a) Power factor
b) Urban gain
c) Clutter factor
d) Urban factor
Answer: d
Explanation: The urban factor (UF) is derived by comparing the predictions by the original Longley –Rice model wi
th those obtained by Okumura. It deals with radio propagation in urban areas and is relevant to mobile radio.
a) True
b) False
Answer: b
Explanation: One shortcoming of the Longley –Rice model is that it does not provide a way of determining correctio
ns due to environmental factors. It does not consider correction factors to account for the effects of buildings and fol
iage. Multipath is also not considered.
6. Which method is used by Edwards and Durkin algorithm to calculate the loss associated with diffraction edges?
a) True
b) False
Answer: a
Explanation: Durkin’s model is very attractive because it can read in a digital elevation map and perform a site speci
fic propagation computation on the elevation data. It can produce a signal strength contour that is reported to be goo
d within a few dB.
8. Which of the most widely used model for signal prediction in urban areas?
a) 1 m to 10 m
b) 1 km to 100 km
c) 100 km to 1000 km
d) 10 km to 10000 km
Answer: b
Explanation: Okumura’s model is applicable for distances of 1 km to 100 km. It can be used for base station antenna
heights ranging from 30 m to 1000 m. Okumura developed a set of curves giving the median attenuation relative to
free space in an urban area.
a) True
b) False
Answer: b
Explanation: Okumura’s model is considered to be among the simplest and best in terms of accuracy in path loss pre
diction for mature cellular and land mobile radio system. It is very practical and has become a standard for system pl
anning in modern land mobile system in Japan.
11. Which of the following is the major disadvantage of the Okumura model?
a) Complex
b) Inaccurate
c) Not practical
d) Slow response to rapid change in terrain
Answer: d
Explanation: The major disadvantage with the model is its slow response to rapid changes in terrain. Therefore the
model is fairly good in urban and suburban areas, but not as good in rural areas. Common standard deviations betwe
en predicted and measured path loss values are 10 dB to 14 dB.
12. The Hata model is empirical formulation of which model?
a) Okumura model
b) Longley- Rice model
c) Durkin’s model
d) Walfisch and Bertoni model
Answer: a
Explanation: The Hata model is an empirical formulation of the graphical path loss data provided by Okumura. It is
valid from 150 MHz to 1500 MHz. Hata presented the urban area propagation loss as a standard formulation. It supp
lied correct Equations for application to other situations.
14. Which of the following considers the impact of rooftops and building?
a) Okumura model
b) Hata model
c) Walfisch and Bertoni model
d) Longley- Rice model
Answer: c
Explanation: The impact of rooftops and building height is considered by Walfisch and Bertoni model. It uses diffra
ction to predict average signal strength at street level. It considers path loss to be a product of three factors.
1. The variability of the environment is slower for a smaller range of T-R separation distances in indoor models.
a) True
b) False
Answer: b
Explanation: The indoor radio channel differs from the traditional mobile radio channel. The distances covered are
much smaller and variability of the environment is much greater for a much smaller range of T-R separation distanc
es.
a) True
b) False
Answer: a
Explanation: Smaller propagation distances make it more difficult to insure far field radiation for all receiver locatio
n and types of antenna. The condition is very variable for smaller propagation distances.
a) Soft partitions
b) Hard partitions
c) Disk partition
d) Dynamic partition
Answer: a
Explanation: Partitions that may be moved are called soft partitions. They do not span to the ceiling. Office building
s often have large open areas which are constructed by using moveable office partitions. Thus, space can be reconfig
ured easily.
6. Losses between the floors of the building can be determined using ________
a) Internal dimensions
b) Material used to create antenna
c) External dimension
d) Line of sight path
Answer: c
Explanation: The losses between floors of a building are determined by external dimensions as well as materials of t
he building. It is also determined using type of construction used to create the floors and external surroundings.
7. Technique of drawing a single ray between the transmitter and receiver is called ______
1. Small scale fading describes the _________ fluctuations of the amplitude, phases of a signal.
a) Rapid
b) Slow
c) Instantaneous
d) Different
Answer: a
Explanation: Small scale fading or simply fading, is used to describe the rapid fluctuations of amplitudes, phases, or
multipath delays of a radio signal over a short period of time or travel distance. It ignores the large scale path loss.
a) True
b) False
Answer: a
Explanation: Fading is caused by interference. It is caused by interference between two or more versions of the trans
mitted signal which arrive at the receiver at slightly different times.
4. In urban areas, fading occurs due to height of mobile antenna ________ than height of surrounding structure.
a) Same
b) Smaller
c) Greater
d) Very larger
Answer: b
Explanation: In urban areas, fading occurs because height of the mobile antenna is below the height of surrounding s
tructures. Therefore, there is no single line of sight path to the base station.
a) True
b) False
Answer: b
Explanation: The received signal may fade even when the mobile receiver is stationary. It is due to the movement of
surrounding objects in the radio channel. The multipath components combine vectorially at the receiver antenna and
cause signal to distort or fade.
6. Apparent shift in frequency in multipath wave is caused due to relative motion between________
a) Velocity
b) Height of antenna
c) Power of receiving antenna
d) Power of transmitter
Answer: a
Explanation: The shift in received signal frequency due to motion is called Doppler shift. It is directly proportional t
o the velocity and direction of motion of mobile with respect to the direction of arrival of the received multipath wav
e.
8. Which of the following factor does not influence small scale fading?
a) Multipath propagation
b) Power density of base station
c) Speed of mobile
d) Speed of surrounding objects
Answer: b
Explanation: Many physical factors in radio channel influence small scale fading. Multipath propagation, speed of m
obile, speed of surrounding objects, transmission bandwidth of the signal influences small scale fading in a large wa
y.
9. Signal will distort if transmitted signal bandwidth is greater than bandwidth of __________
a) Receiver
b) Radio channel
c) Multipath channel
d) Transceiver
Answer: c
Explanation: Received signal will be distorted if transmitted signal bandwidth is greater than bandwidth of multipath
channel. But received signal strength will not fade much over a local area.
10. What is a measure of the maximum frequency difference for which signals are strongly correlated in amplitude?
a) Coherence bandwidth
b) Narrow bandwidth
c) Incoherent bandwidth
d) Wide bandwidth
Answer: a
Explanation: The bandwidth of the channel can be quantified by the coherence bandwidth. It is related to the specific
multipath structure of channel. It is a measure of maximum frequency difference for which signals are strongly corr
elated in amplitude.
11. The Doppler shift for mobile moving with constant velocity, v is given by _______
a) (v*cos θ)/λ
b) v/λ
c) v*cos θ
d) v*λ
Answer: a
Explanation: Doppler shift is given by (v*cos θ)/λ. This formula relates the Doppler shift to the mobile velocity and
spatial angle between the direction of motion of mobile and the direction of arrival of the wave.
12. Doppler shift is positive if mobile is moving away from direction of arrival of the wave.
a) True
b) False
Answer: b
Explanation: Doppler shift is positive if the mobile is moving toward the direction of arrival of the wave, as the appa
rent received frequency is increased. And if the mobile is moving away from the direction of arrival of the wave, Do
ppler shift is negative.
1. Small scale variations of a mobile radio signal are directly related to _______
a) True
b) False
Answer: b
Explanation: Impulse response is a wideband channel characterization. It contains all information necessary to simul
ate or analyse any type of radio transmission through the channel.
a) Non-linear
b) Low-pass
c) Linear
d) Bandpass
Answer: c
Explanation: Mobile radio channel may be modelled as a linear filter with a time varying impulse response. The tim
e variation is due to receiver motion in space. The filtering nature is caused by summation of amplitudes and delays
of multiple arriving waves at any instant of time.
4. Impulse response does not play any role in characterization of the channel.
a) True
b) False
Answer: b
Explanation: Impulse response is a useful characterization of channel. It may be used to predict and compare the per
formance of different mobile communication systems and transmission bandwidth for a particular mobile channel co
ndition.
5. Received signal can be expressed as ______ of transmitted signal with channel impulse response.
a) Addition
b) Subtraction
c) Division
d) Convolution
Answer: d
Explanation: The received signal y(t) can be expressed as a convolution of transmitted signal x(t) with impulse respo
nse of mobile radio channel. The variable t represents the time variations due to motion and the channel impulse mul
tipath delay for fixed value of t.
6. Discretization of multipath delay axis of impulse response into equal time delay segments is called __________
a) Log
b) Exponential
c) Multiplication
d) Sum
Answer: d
Explanation: The average small received power is the sum of the average powers received in each multipath compon
ent. This is the case if transmitted signal is able to resolve the multipath.
8. The received power of a wideband signal fluctuates significantly when a receiver is moved about a local area.
a) True
b) False
Answer: b
Explanation: Amplitude of individual multipath components does not fluctuate widely in local area. Therefore, the r
eceived power of a wideband signal does not fluctuate significantly when a receiver is moved about a local area.
9. Average power for a CW signal is _______ to average received power for a wideband signal in small scale region
.
a) Equivalent
b) Two times
c) Four times
d) Ten times
Answer: a
Explanation: Average power for a CW signal is equivalent to average received power for a wideband signal in small
scale region. This can occur when either the multipath phases are identically and independently distributed or when
path amplitudes are uncorrelated.
10. The received local ensemble average power of wideband and narrowband signals are ________
a) Different
b) Equivalent
c) Not dependent
d) Double
Answer: b
Explanation: The received local ensemble average power of wideband and narrowband signals is equivalent. When t
he transmitted signal has bandwidth greater than bandwidth of the channel, the received power varies very little. Ho
wever, if transmitted signal has very narrow bandwidth, large fluctuation occurs at receiver.
a) True
b) False
Answer: b
Explanation: Direct RF pulse systems have a very attractive system. They lack complexity because of the use of off t
he shelf equipment. This system can also provide a local average power delay profile.
a) Complexity
b) Not real time
c) Interference and noise
d) Simplicity
Answer: c
Explanation: The main problem with RF pulse system is that it is subject to interference and noise. This is due to wi
de passband filter required for multipath time resolution.
4. Why is the phase of individual multipath components are not received in RF Pulse system?
5. Spread spectrum sliding correlator has better ________ in comparison to RF pulse system.
a) Dynamic range
b) Frequency
c) Power density
d) Structure
Answer: a
Explanation: While the probing signal may be wideband, it is possible to detect the transmitted signal using a narrow
band receiver preceded by a wideband mixer. Thus, it improves the dynamic range of the system in comparison to R
F pulse system.
6. If a PN sequence has chip duration of Tc, then chip rate is given by ___________
a) Tc
b) 1/Tc
c) 2 Tc
d) Tc2
Answer: b
Explanation: In a spread spectrum channel sounder, a carrier signal is spread over a large bandwidth. It is done by m
ixing it with a binary pseudo number (PN) sequence having a chip duration of Tc and chip rate of 1/Tc.
7. The maximal length of PN sequence, the sequence length for n number of shift register is ______
a) 2n
b) 1/2n
c) 2n – 1
d) 2n + 1
Answer: c
Explanation: For a maximal length pseudo number (PN) sequence, the sequence length is 2n – 1. Here, n is the num
ber of shift registers in the sequence register.
8. The ratio between transmitter chip clock rate and the difference between the transmitter chip clock and difference
between transmitter and receiver chip clock rates is called ___________
a) Slide factor
b) Chip factor
c) Reuse factor
d) Shape factor
Answer: a
Explanation: The slide factor is defined as ratio between transmitter chip clock rate and the difference between the tr
ansmitter chip clock and difference between transmitter and receiver chip clock rates. It is unit less quantity.
9. Which of the following is not an advantage of spread spectrum channel sounding system?
10. Which of the following is a disadvantage of spread spectrum channel sounding system?
a) Passband noise
b) Less coverage area
c) Large transmitter power required
d) Not in real time
Answer: d
Explanation: A disadvantage of spread spectrum system as compared to direct RF pulse system, is that measurement
s are not made in real time. But they are compiled as the PN codes slide past one another.
11. There is no relationship between time domain and frequency domain techniques.
a) True
b) False
Answer: b
Explanation: There is a dual relationship between time domain and frequency domain techniques. Therefore, it is po
ssible to measure the channel impulse response in the frequency domain. Frequency domain channel sounder is used
for measuring channel impulse response.
a) Time
b) Frequency
c) Time-frequency
d) Spatial
Answer: b
Explanation: Transmissivity response is a frequency domain response. It is a frequency domain representation of cha
nnel impulse response. This response is then converted to the time domain using inverse discrete Fourier transform.
13. Frequency domain channel sounding technique do not require hard wired synchronization between transmitter a
nd receiver.
a) True
b) False
Answer: b
Explanation: Frequency domain channel sounding system requires careful calibration and hardwired synchronization
between transmitter and receiver. However, this technique works well and indirectly provides amplitude and phase i
nformation in the time domain.
a) Real time
b) Digital
c) Non real time
d) Analog
Answer: c
Explanation: Frequency domain channel sounding system makes measurements of non real time nature. For time var
ying channels, the channel frequency response can change rapidly giving an erroneous impulse response measureme
nt.
1. Power delay profile is represented as plots of __________ with respect to fixed time delay reference.
2. Which of the following is not a multipath channel parameter that can be determined from power delay profile?
3. The time dispersive properties of wideband multipath channel are quantified by ______ and _______
4. _______ is the square root of the second central moment of the power delay profile.
5. Which of the following is the first moment of the power delay profile?
6. What is the order of typical values of rms delay spread in outdoor mobile radio channels?
a) Microseconds
b) Nanoseconds
c) Seconds
d) Minutes
Answer: a
Explanation: Typical values of rms delay spread are on the order of microseconds in outdoor mobile radio channels.
For indoor mobile radio channels, they are of the order of nanoseconds.
7. Power delay profile and magnitude frequency response of a mobile radio channel are related through _______
a) Laplace Transform
b) Fourier Transform
c) S Transform
d) Wavelet Transform
Answer: b
Explanation: Power delay profile and magnitude frequency response of a mobile radio channel are related through th
e Fourier transform. Therefore, it is possible to obtain an equivalent description of the channel in the frequency dom
ain using its frequency response characteristics.
9. Coherence bandwidth is a statistical measure of range of frequencies over which channel is considered _______
a) Time dispersive
b) Frequency selective
c) Time variant
d) Flat
Answer: d
Explanation: Coherence bandwidth is a statistical measure of range of frequencies over which channel is considered
flat. A flat channel is a channel which passes all spectral components with approximately equal gain and linear phas
e.
10. Which of the following describes time varying nature of the channel in a small scale region?
11. Doppler spread is a range of frequencies over which received Doppler spread is _______
a) Zero
b) Non zero
c) Infinite
d) One
Answer: b
Explanation: Doppler spread is a range of frequencies over which received Doppler spectrum is essentially non-zero.
It is a measure of spectral broadening caused by time rate of change of mobile radio channel.
12. _______ is a statistical measure of time duration over which channel impulse response is invariant.
a) Coherence time
b) Doppler spread
c) Mean excess delay
d) Rms delay spread
Answer: a
Explanation: Coherence time is actually a statistical measure of the time duration over which the channel impulse re
sponse is essentially invariant. It quantifies the similarity of the channel response at varying times.
a) Bandwidth
b) Coherence time
c) Rms delay spread
d) Doppler spread
Answer: a
Explanation: Channel parameters are coherence bandwidth, rms delay spread and Doppler spread. Signal parameters
are bandwidth and symbol period. Different types of fading occur depending on the relation between channel and si
gnal parameters.
a) Doppler spread
b) Multipath delay spread
c) Time dispersive parameters
d) Frequency delay spread
Answer: b
Explanation: Multipath delay spread leads to time dispersion and frequency selective fading. Doppler spread leads to
frequency dispersion and time selective fading. These two propagation mechanism are independent of each other.
a) True
b) False
Answer: b
Explanation: In flat fading, the multipath structure of the channel is such that spectral characteristics of the transmitt
ed signal are preserved at the receiver. But, the strength of the received signal changes with time due to fluctuations
in the gain of channel caused by multipath.
6. In a frequency selective fading, mobile radio channel possess a constant gain and a linear phase over bandwidth s
maller than bandwidth of transmitted signal.
a) True
b) False
Answer: a
Explanation: If the channel possesses a constant gain and linear phase response over a bandwidth that is smaller than
the bandwidth of transmitted signal, then the channel creates frequency selective fading on the received signal. Freq
uency selective fading channel are much more difficult to model than flat fading channel.
a) Narrowband channel
b) Wideband channel
c) Amplitude varying channel
d) Phase varying channel
Answer: b
Explanation: Frequency selective fading channels are also known as wideband channels. The bandwidth of the signa
l is wider than the bandwidth of channel impulse response.
a) True
b) False
Answer: b
Explanation: Frequency selective fading is due to time dispersion of the transmitted symbols within the channel. Thu
s, the channel induces intersymbol interference (ISI). The channel have certain frequency components in the receive
d signal spectrum that have greater gain than others.
9. For fast fading channel, the coherence time of the channel is smaller than _______ of transmitted signal.
a) Doppler spread
b) Bandwidth
c) Symbol period
d) Coherence bandwidth
Answer: c
Explanation: In fast fading channel, the channel impulse response changes rapidly within the symbol duration. Thus,
the coherence time of the channel is much smaller than the symbol period of the transmitted signal.
10. In slow fading channel, Doppler spread of the channel is much less than the ________ of baseband signal.
a) Symbol period
b) Phase
c) Coherence time
d) Bandwidth
Answer: d
Explanation: Slow fading channel may be assumed to be static over one or several reciprocal bandwidth intervals. In
the frequency domain, this implies that the Doppler spread of the channel is much less than the bandwidth of the ba
seband signals.
1. Which of the following distribution is used for describing statistical time varying nature of received envelope of
multipath component?
2. Envelope of the sum of two quadrature Gaussian noise signal obeys _________ distribution.
a) Rayleigh
b) Inverse Gaussian
c) Nakagami
d) Gamma
Answer: a
Explanation: It is well known that the envelope of the sum of two quadrature Gaussian noise signal obeys Rayleigh
distribution. This fading distribution could be applied to any scenario where there is no line of sight path between tra
nsmitter and receiver antennas.
a) 2 dB
b) 10 dB
c) 0.55 dB
d) 100 dB
Answer: c
Explanation: The mean and median differ by only 0.55 dB in a Rayleigh fading signal. The differences between the r
ms values and the other two values are higher.
4. It is easy to compare different fading distributions using mean values instead of median values.
a) True
b) False
Answer: b
Explanation: By using median values instead of mean values, it is easy to compare different fading distributions whi
ch may have widely varying means. Median is used in practice since fading data is measured in the field and a partic
ular distribution cannot be assumed.
5. For a nonfading signal component present, the small scale fading envelope distribution is ____________
a) Rayleigh
b) Gaussian
c) Log normal
d) Ricean
Answer: d
Explanation: The small scale fading envelope is Ricean when there is a dominant stationary (nonfading) signal comp
onent, such as line of sight propagation path. In such a situation, random multipath components arriving at different
angles are superimposed on a stationary dominant signal.
6. Ricean distribution degenerates to ________ distribution when the dominant component fades away.
a) Log normal
b) Gamma
c) Rayleigh
d) Gaussian
Answer: c
Explanation: Ricean distribution degenerates to Rayleigh distribution when the dominant component fades away. As
the dominant signal becomes weaker, the composite signal resembles a noise signal which has an envelope that is R
ayleigh.
a) Uniformly distributed
b) Rayleigh
c) Ricean
d) Gaussian
Answer: b
Explanation: The envelope of only bandpass noise is Rayleigh distribution. Rayleigh distribution is a continuous pro
bability density function for positive random variables.
a) Uniformly distributed
b) Rayleigh
c) Ricean
d) Gaussian
Answer: c
Explanation: The envelope of a sinusoid plus bandpass noise has Ricean distribution. In probability theory, Ricean d
istribution is the probability distribution which has magnitude of a circular bivariate normal random variable with po
tentially non-zero mean.
9. What do you call an attenuation that occurs over many different wavelengths of the carrier?
a) Rayleigh fading
b) Ricean fading
c) Wavelength fading
d) Slow fading
Answer: d
Explanation: Slow fading does not vary quickly with the frequency. It originates due to effect of mobility. Slow fadi
ng is the result of signal path change due to shadowing and obstructions such as tree or buildings etc.
10. Which of the reception problems below that is not due to multipath?
a) Delayed spreading
b) Rayleigh fading
c) Random Doppler shift
d) Slow fading
Answer: d
Explanation: Slow fading arises when the coherence time of the channel is large relative to the delay requirement of
the application. Slow fading is caused by events such as shadowing, where a large obstruction such as a hill or large
building obscures the main signal path between the transmitter and the receiver.
1. Which of the following is not a statistical models for multipath fading channels?
2. Who presented the first statistical model for multipath fading channel?
a) Ossana
b) Rayleigh
c) Newton
d) Faraday
Answer: a
Explanation: The first statistical model was presented by Ossana. It was based on interference of wave incident and r
eflected from the flat sides of randomly located buildings. Ossana model predicts flat fading power spectra that were
in agreement with measurements in suburban areas.
a) True
b) False
Answer: b
Explanation: Clarke developed a model where the statistical characteristics of the electromagnetic fields of the recei
ved signal at the mobile are deduced from scattering. Clarke’s model assumes a fixed transmitter with a vertically po
larized antenna.
a) True
b) False
Answer: b
Explanation: Every wave that is incident on the mobile undergoes a Doppler shift. It is due to the motion of the recei
ver and it arrives at the receiver at the same time. Therefore, there is no excess delay due to multipath for any of the
waves.
5. Which of the following is an important statistics of a Rayleigh fading useful for designing error control codes and
diversity schemes?
a) Mobile speed
b) Doppler frequency
c) Level crossing rate (LCR)
d) Power density
Answer: c
Explanation: The level crossing rate (LCR) and average fade duration of a Rayleigh fading signal are important stati
stics. They are useful for designing error control codes and diversity schemes to be used in mobile communication.
6. The level crossing rate (LCR) is defined as expected rate at which _______ fading envelope crosses a specified le
vel.
a) Rayleigh
b) Saleh
c) Vanezuela
d) Faraday
Answer: a
Explanation: The LCR is defined as the expected rate at which the Rayleigh fading envelop is normalized to the loca
l rms signal level. And it crosses a specified level in a positive going direction.
a) True
b) False
Answer: b
Explanation: Clarke’s model and the statistics for Rayleigh fading are for flat fading conditions. They do not conside
r multipath time delay.
a) Indoor
b) Outdoor
c) Air
d) High frequency
Answer: a
Explanation: Saleh and Venezuela reported the results of indoor propagation measurements. The measurements wer
e made between two vertically polarized omnidirectional antennas located on the same floor of a medium sized offic
e building.
10. Saleh and Venezuela show that indoor channel is _______ time varying.
a) Not
b) Very slow
c) Fast
d) Very fast
Answer: b
Explanation: The results obtained by Saleh and Venezuela shows that the indoor channel is quasi static or very slow
time varying. It shows that the statistics of the channel impulse response are independent of transmitting and receivi
ng antenna polarization.
11. What is the full form of SIRCIM?
1. The term small scale fading describes the slow fluctuations of received power level due to changes in receiver pos
ition.
a) True
b) False
Answer: b
Explanation: The term small scale fading describes the rapid fluctuations of received power level due to changes in r
eceiver position. This effect is due to the constructive and destructive interference of the numerous multipath waves
that impinge upon a wireless receiver.
2. The rapid fluctuations due to small scale fading affect the _________ design.
a) Receiver
b) Transmitter
c) MSC
d) Base station
Answer: a
Explanation: The rapid fluctuation due to small scale fading affect every aspect of receiver design such as dynamic r
ange, equalization, diversity, modulation scheme and channel error correction coding. These fluctuations are a functi
on of direction of travel as related to the angle of arrival of multipath delay.
3. An approximately omnidirectional channel model accurately describes fading statistics if directional antennas are
employed at the receiver.
a) True
b) False
Answer: a
Explanation: An approximately omnidirectional channel model accurately describes fading statistics if directional or
smart antenna systems are employed at the receiver. Unfortunately, recent measurements and models have shown th
at the arriving multipath in a local area bears little resemblance to the omnidirectional propagation.
a) Angular spread
b) Angular constriction
c) Azimuthal direction of maximum fading
d) Angle of arrival
Answer: d
Explanation: Three principle shape factors are angular spread, angular constriction, and azimuthal direction of maxi
mum fading. They are exactly related to the average rate at which a received signal fades.
5. Angular spread is a measure of how multipath concentrates about __________
a) Angle of arrival
b) Transmitted power
c) Single azimuthal direction of arrival
d) Received power
Answer: c
Explanation: The shape factor, angular spread is a measure of how multipath concentrates about a single azimuthal d
irection of arrival. It has several advantages like it is invariant under changes in transmitted power.
6. Angular constriction is a measure of how multipath concentrates about ______ azimuthal direction.
a) Single
b) Two
c) Three
d) Four
Answer: b
Explanation: The shape factor, angular constriction is a measure of how multipath concentrates about two azimuthal
directions. The measure for angular constriction is invariant under changes in transmitted power.
a) True
b) False
Answer: a
Explanation: Azimuthal direction of maximum fading is the third shape factor which is a directional or orientation p
arameter. Its value corresponds to the direction in which s mobile user would move in order to experience the maxi
mum fading rate in the local area.
a) Mean
b) Mean square
c) Mean squared derivative
d) Mean squared integral
Answer: c
Explanation: Mean squared derivative of a stationary process is actually the variance of the rate of change. The mea
n derivative of the stationary process is zero; the mean squared derivative is the simplest statistics that measures the
fading rate of a channel.
9. Complex received voltage is a summation of __________ that have impinged upon receiver antenna.
a) Multipath waves
b) Waves
c) Power density
d) Single path waves
Answer: a
Explanation: Complex received voltage is a baseband representation. It us a summation of numerous multipath wave
s that have impinged upon the receiver antenna and have excited a complex voltage component at the input of a rece
iver.
12. Which of the following describes the average fading rate within a local area?
a) Angular spread
b) Angular constriction
c) Azimuthal direction of maximum fading
d) Angle of arrival
Answer: a
Explanation: Angular spread describes the average fading rate within a local area. The average of the two fading rate
variances, regardless of the orientation of the measurement, is always given by averaging the variances observed ov
er two perpendicular directions within the local area.
13. Angular constriction affects the average fading rate within local area.
a) True
b) False
Answer: b
Explanation: Angular constriction does not affect the average fading rate within local area. It describes the variabilit
y of fading rates taken along different azimuthal directions.
1. Which is the process of encoding information from a message source in suitable manner for transmission?
a) Modulation
b) Demodulation
c) Encryption
d) Decryption
Answer: a
Explanation: Modulation is the process of encoding information from a message source in suitable manner for trans
mission. It translates the baseband message signal to a bandpass signal at frequencies that are very higher compared
to the baseband frequency.
a) True
b) False
Answer: b
Explanation: The bandpass signal is called the modulated signal and the baseband message signal is called the modu
lating signal. Modulation is done by varying the amplitude, phase or frequency of a high frequency carrier in accord
ance with the amplitude of the message signal.
a) Amplitude
b) Magnitude
c) Frequency
d) Power
Answer: a
Explanation: AM signals have all information in the amplitude of the carrier. Because, AM signal superimpose the e
xact relative amplitudes of the modulating signal onto the carrier.
4. In frequency modulation, the amplitude of modulated carrier signal is ______and its frequency is ______ by the
modulating message signal.
a) Constant, constant
b) Varied, constant
c) Constant, varied
d) Varied, varied
Answer: c
Explanation: In frequency modulation (FM), the amplitude of modulated carrier signal is kept constant while its freq
uency is varied by the modulating message signal. FM is the most popular analog modulation technique used in mob
ile communication.
a) Amplitude
b) Magnitude
c) Frequency
d) Power
Answer: c
Explanation: FM signal have all their information in the phase or frequency of the carrier. This provides a nonlinear
and very rapid improvement in reception quality once a certain minimum received signal level, called FM threshold
is achieved.
6. Amplitude modulation has ______ relationship between the quality of the received signal and the power of the rec
eived signal.
a) No
b) Non linear
c) Constant
d) Linear
Answer: d
Explanation: In amplitude modulation schemes, there is a linear relationship between the quality of the received sign
al and the power of the received signal. AM signals superimpose the exact relative amplitudes of the modulating sig
nal onto the carrier.
a) Same
b) Less
c) No
d) Better
Answer: d
Explanation: FM offers many advantages over amplitude modulation which makes it a better choice for many mobil
e radio applications. Frequency modulation has better noise immunity when compared to amplitude modulation.
8. FM signals are _____ susceptible to atmospheric and impulse noise as compared to AM.
a) Largely
b) Less
c) Not
d) Better
Answer: b
Explanation: FM signals are represented as frequency variations rather than amplitude variations. Therefore, FM sig
nals are less susceptible to atmospheric and impulse noise.
a) True
b) False
Answer: b
Explanation: If the FM received signal is above the FM threshold, burst noise does not affect FM system performanc
e as much as AM systems. It is due to the fact that message amplitude variations do not carry information in FM.
a) True
b) False
Answer: b
Explanation: Unlike AM, FM has a modulation index. Hence, bandwidth occupancy can be varied to obtain greater s
ignal to noise performance. Thus, it is possible to tradeoff bandwidth occupancy for improved noise performance.
a) Varied
b) Small
c) Large
d) Constant
Answer: d
Explanation: An FM signal is a constant envelope signal. It is due to the fact that the envelope of the carrier does not
change with changes in the modulating signal. Hence, the transmitted power of an FM signal is constant regardless
of the amplitude of the message signal.
13. FM uses class______ amplifiers and AM uses class ______ amplifiers.
a) C, C
b) A, C
c) C, A
d) AB, C
Answer: c
Explanation: The constant envelope of the transmitted signal allows efficient class C amplifiers. However in AM, it i
s critical to maintain linearity between the applied message and amplitude of transmitted signal. Therefore, class A o
r AB are used for AM systems.
a) True
b) False
Answer: b
Explanation: AM systems do not exhibit capture effect characteristics because all the interferers are received at once
and must be discriminated after the modulation process. FM exhibits this characteristic. Capture effect is a direct res
ult of rapid non-linear improvement in received quality for an increase in receives power.
a) Burst noise
b) Susceptible to atmospheric noise
c) Wider frequency band
d) Poor performance in fading
Answer: c
Explanation: FM systems have many advantages over AM systems. They also have certain disadvantages. FM syste
ms require a wider frequency band in transmitting media in order to obtain the advantages of reduced noise and capt
ure effect. It is generally several times as large as that needed for AM.
a) High frequency
b) Low frequency
c) High amplitude
d) Low amplitude
Answer: a
Explanation: Carrier signal in modulation technique is a high frequency signal. In amplitude modulation, the amplitu
de of a high frequency carrier signal is varied in accordance to the instantaneous amplitude of the modulating signal.
a) 100%
b) 2%
c) 50%
d) 70%
Answer: c
Explanation: The modulation is also expressed in percentage. It is also called percentage modulation. The signal is s
aid to be 50% modulated if the peak message signal amplitude is half the peak amplitude of the carrier signal.
4. A percentage of modulation greater than ___________ will distort the message signal.
a) 10%
b) 25%
c) 50%
d) 100%
Answer: d
Explanation: A percentage of modulation greater than 100% will distort the message signal if detected by an envelop
e detector. In this case the lower excursion of the signal will drive the carrier amplitude below zero, making it negati
ve (and hence changing its phase).
5. The RF bandwidth of AM is ____________ the maximum frequency contained in the modulating message signal.
a) Equal
b) Two times
c) Four times
d) Ten times
Answer: b
Explanation: The RF bandwidth of an AM signal is equal to BAM=2fm. It is double the maximum frequency contai
ned in the modulating message signal. AM spectrum consists of an impulse at the carrier frequency and two sideban
ds which replicate the message spectrum.
a) True
b) False
Answer: b
Explanation: Single sideband (SS
b) AM systems transmit only one of the sidebands (either upper or lower) about the carrier. Hence, they occupy only
half the bandwidth of conventional AM systems.
a) Poor
b) Best
c) Good
d) Average
Answer: a
Explanation: SSB systems have the advantage of being very bandwidth efficient. But their performance in fading ch
annels is very poor. For proper detection, the frequency of the oscillator at the product detector mixer in the receiver
must be same as that of the incoming carrier frequency.
8. Which of the following is a disadvantage of tone-in-band SSB system?
a) High bandwidth
b) Bad adjacent channel protection
c) Effects of multipath
d) Generation and reception of signal is complicated
Answer: d
Explanation: Tone-in-band SSB systems has the advantage of maintaining the low bandwidth property of the SSB si
gnals, while at the same time providing good adjacent channel protection. The tone in band system employs feedfor
ward automatic gain and frequency control to mitigate the effects of multipath induced fading.
10. AM demodulation technique can be divided into _____ and _____ demodulation.
a) Direct, indirect
b) Slope detector, zero crossing
c) Coherent, noncoherent
d) Quadrature detection, coherent detection
Answer: c
Explanation: AM demodulation techniques may be broadly divide into two main categories. They are called coheren
t and noncoherent demodulation. They are differentiated by the knowledge of transmitted carrier frequency and phas
e at the receiver.
11. Non coherent detection requires the knowledge of transmitted carrier frequency and phase at the receiver.
a) True
b) False
Answer: b
Explanation: Non coherent detection does require the knowledge of phase information. However, coherent detection
requires knowledge of the transmitted carrier frequency and phase at the receiver.
a) Envelope detector
b) Differentiator
c) Integrator
d) Phase detector
Answer: d
Explanation: A product detector is also called a phase detector. It forms a coherent demodulator for AM signals. It is
a down converter circuit which converts the input bandpass signal to a baseband signal.
13. AM system use only product detector for demodulation. They never use envelope detectors.
a) True
b) False
Answer: b
Explanation: AM systems can use either product detector or envelope detector for demodulation. As a rule, envelope
detectors are useful when input signal power is at least 10dB greater than noise power, whereas product detectors ar
e able to process the AM signals with input signal to noise ratios well below 0 dB.
a) Angle modulation
b) Phase modulation
c) Amplitude modulation
d) Frequency modulation
Answer: a
Explanation: FM is a part of general class of modulation known as angle modulation. Angle modulation varies a sin
usoidal carrier signal in such a way that the angle of the carrier is varied according to the amplitude of the modulatin
g baseband signal.
a) Frequency
b) Amplitude
c) Phase
d) Angle
Answer: b
Explanation: FM is called the constant envelope because amplitude of the carrier wave is kept constant. It is duo to t
he fact that the envelope of the carrier does not change with changes in the modulating signal.
3. Which of the following are two most important classes of angle modulation?
4. Frequency modulated signal is regarded as the phase modulated signal in which the modulating wave is differenti
ated before modulation.
a) True
b) False
Answer: b
Explanation: Frequency modulated signal is regarded as the phase modulated signal in which the modulating wave i
s integrated before modulation. This means that an FM signal can be generated by first integrating the message signa
l and then using the result as an input to a phase modulator.
5. Frequency modulation index defines the relationship between the ______ and bandwidth of transmitted signal.
a) Carson’s
b) Faraday’s
c) Maxwell’s
d) Armstrong’s
Answer: a
Explanation: The approximation of bandwidth is done using Carson’s rule. Carson’s bandwidth rule defines the appr
oximate bandwidth requirements of communications system components for a carrier signal that is frequency modul
ated by a continuous or broad spectrum of frequencies rather than a single frequency.
8. In indirect method, the carrier frequency is directly varied in accordance with the input modulating signal.
a) True
b) False
Answer: b
Explanation: The above is the case for direct method. In the indirect method, a narrowband FM signal is generated u
sing a balanced modulator, and frequency multiplication is used to increase both the frequency deviation and the car
rier frequency to the required level.
9. Which of the following is used to vary the frequency of the carrier frequency in accordance with the baseband sig
nal amplitude variations in direct method of FM generation?
a) Integrator
b) Envelope detector
c) Multivibrator
d) Voltage controlled oscillators
Answer: d
Explanation: In direct method, VCOs are used to vary the frequency of the carrier signal in accordance with the base
band signal amplitude variations. These oscillators use devices with reactance that can be varied by the application o
f a voltage.
a) True
b) False
Answer: a
Explanation: Frequency demodulator produces an output voltage with instantaneous amplitude that is directly propor
tional to the instantaneous frequency of the input FM signal. Thus, frequency demodulator is a frequency to amplitu
de converter circuit.
a) Slope detection
b) Zero crossing detection
c) Product detector
d) Phase locked discriminator
Answer: c
Explanation: Various techniques such as slope detection, zero crossing detection, phase locked discrimination and q
uadrature detection are used to demodulate FM. Product detector is used for demodulating AM signals.
12. Which of the following FM demodulator is sometimes known as pulse averaging discriminator?
a) Slope detection
b) Zero crossing detection
c) Quadrature detection
d) Phase locked discriminator
Answer: b
Explanation: Zero crossing detector is sometimes known as pulse averaging discriminator. The rationale behind this
technique is to use the output of the zero crossing detector to generate a pulse train with an average value that is pro
portional to frequency of the input signal.
14. In angle modulation, signal to noise ratio before detection is a function of ______
a) Modulation index
b) Input signal to noise ratio
c) Maximum frequency of the message
d) IF filter bandwidth
Answer: d
Explanation: In angle modulation systems, the signal to noise ratio before detection is the function of the receiver IF
filter bandwidth, received carrier power, and received interference. However, signal to noise ratio after detection is a
function of maximum frequency of the message, input signal to noise ratio and modulation index.
15. FM can improve the receiver performance through adjustment of transmitted power.
a) True
b) False
Answer: b
Explanation: FM can improve receiver performance through adjustment of the modulation index at the transmitter, a
nd not the transmitted power. This is not the case in AM since linear modulation techniques do not trade bandwidth
for SNR.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) True
b) False
Answer: b
Explanation: Modern mobile communication systems use digital modulation techniques. Advancements in VLSI an
d digital signal processing technology have made digital modulation more cost effective than analog transmission sy
stems.
3. A desirable modulation scheme provides _________ bit error rates at __________ received signal to noise ratios.
a) Low, low
b) Low, high
c) High, high
d) High, low
Answer: a
Explanation: A desirable modulation scheme provides low bit error rates at low received signal to noise ratios. They
perform well in multipath and fading conditions, occupies a minimum bandwidth and is easy and cost effective to im
plement.
a) Power efficiency
b) Bandwidth efficiency
c) Cost and complexity
d) Transmitted power
Answer: d
Explanation: The performance of modulation scheme is often measured in terms of its power efficiency and bandwi
dth efficiency. Other factors also affect the choice of modulation scheme, such as cost and complexity of the subscri
ber receiver and modulation which is simple to detect.
5. In digital communication system, in order to increase noise immunity, it is necessary to increase _________
a) Signal power
b) Signal amplitude
c) Signal frequency
d) Signal magnitude
Answer: a
Explanation: In digital communication system, in order to increase noise immunity, it is necessary to increase signal
power. However, the amount by which the signal power should be increased to obtain a certain level of fidelity depe
nds on the particular type of modulation employed.
6. Which of the following is the ratio of signal energy per bit to noise power spectral density?
a) Bandwidth efficiency
b) Spectral density
c) Power efficiency
d) Power density
Answer: c
Explanation: Power efficiency is often expressed as the ratio of signal energy per bit to noise power spectral density
required at the receiver input for a certain probability of error. Power efficiency is a measure of how favourably the t
rade-off between fidelity and signal power is made.
7. Increasing the data rate implies the increase in pulse width of digital symbol.
a) True
b) False
Answer: b
Explanation: There is an unavoidable relationship between data rate and bandwidth occupancy. Increasing the data r
ate implies decreasing the pulse width of a digital symbol, which increases the bandwidth of the signal.
8. Which of the following is the ratio of the throughput data rate per Hertz?
a) Bandwidth efficiency
b) Spectral density
c) Power efficiency
d) Power density
Answer: a
Explanation: Bandwidth efficiency reflects how efficiently the allocated bandwidth is utilized. It is defined as the rat
io of throughput data rate per Hertz in a given bandwidth. It describes the ability of a modulation scheme to accomm
odate data within a limited bandwidth.
9. Which of the following is defined as the range of frequencies over which the signal has a non zero power spectral
density?
a) Absolute bandwidth
b) Null to null bandwidth
c) 3 dB bandwidth
d) Zero dB bandwidth
Answer: c
Explanation: Half power bandwidth is also called the 3 dB bandwidth. It is defined as the interval between frequenci
es at which the PSD has dropped to half power, or 3 dB below the peak value.
1. Intersymbol interference (ISI) leads to ________ probability of the receiver for making an error in detecting the s
ymbols.
a) Increased
b) Decreased
c) Zero
d) One
Answer: a
Explanation: ISI leads to increased probability of the receiver making an error in detecting a symbol. When rectangu
lar pulses are passed through a bandlimited channel, the pulses will spread in time, and the pulse for each symbol wi
ll smear into the time intervals of succeeding symbols.
a) Maximized
b) Minimized
c) Zero
d) Infinite
Answer: b
Explanation: Increasing channel bandwidth is one of the method to minimize intersymbol interference. But mobile c
ommunication systems use minimal bandwidth, thus other methods to reduce ISI are desirable.
a) To increase ISI
b) To increase spectral width of modulated signal
c) To reduce ISI
d) To reduce power spectral density
Answer: c
Explanation: Pulse shaping techniques reduces the intersymbol interference. They are also used to reduce the spectra
l width of the modulated digital signal.
a) Manchester
b) Faraday
c) Graham Bell
d) Nyquist
Answer: d
Explanation: Nyquist was the first to solve the problem of ISI. He overcome the problem of ISI while keeping the tr
ansmission bandwidth low. He observed that ISI can be completely nullified if at every instant, the response due to a
ll symbols except the current symbol is equal to zero.
5. According to Nyquist, the impulse response of the overall communication system should have ______ decay with
_______ magnitude for sample values not equal to zero.
a) Fast, small
b) Slow, small
c) Slow, large
d) Fast. Large
Answer: a
Explanation: According to Nyquist, the impulse response of the overall communication system should have fast dec
ay with small magnitude for sample values not equal to zero. If the channel is ideal then it should be possible to reali
ze approximate shaping filters at both transmitter and receiver.
a) True
b) False
Answer: b
Explanation: Raised cosine filter is the most popular pulse shaping filter used in mobile communication. It belongs t
o the class of filters that satisfy Nyquist criterion.
7. As the roll off factor in raised cosine rolloff filter __________ the occupied bandwidth ________
a) Increases, decreases
b) Decreases, constant
c) Increases, increases
d) Decreases, increases
Answer: c
Explanation: As the rolloff factor increases, the bandwidth of the filter also increases and the time sidelobe levels de
crease in adjacent symbol slots. Thus, it implies that increasing rolloff factor decreases the sensitivity to timing jitter
but increases the occupied bandwidth.
a) True
b) False
Answer: b
Explanation: Gaussian pulse shaping filter uses non Nyquist technique. It is effective when used in conjunction with
minimum shift keying (MSK) modulation, or other modulation which is well suited for power efficient nonlinear am
plifiers.
a) True
b) False
Answer: b
Explanation: Nyquist filters have zero crossings at adjacent symbol peaks and a truncated transfer function. Gaussia
n filter does not follow Nyquist criterion and has a smooth transfer function with no zero crossings.
a) Large bandwidth
b) Minimum ISI
c) High overshoot
d) Sharp cut off
Answer: d
Explanation: The Gaussian filter has a narrow absolute bandwidth, and has a sharp cut off, low overshoot and pulse
area preservation properties. This makes it attractive for use in mobile communication that uses nonlinear RF amplif
iers.
11. Gaussian pulse shaping filter reduces the spectral occupancy and ISI.
a) True
b) False
Answer: b
Explanation: Gaussian pulse shaping does not satisfy Nyquist criterion for ISI cancellation. Thus, it reduces the spec
tral occupancy but there is degradation in the performance due to increased ISI.
12. Gaussian pulses are used when cost and power efficiency are major factors.
a) True
b) False
Answer: a
Explanation: Gaussian pulses are used when cost and power efficiency are major factors. But the bit error rates due t
o ISI are deemed to be lower than what is nominally required. Thus, there is a trade-off between desired RF bandwid
th and irreducible error due to ISI.
1. In linear modulation technique __________ of transmitted signal varies linearly with modulating digital signal.
a) Amplitude
b) Frequency
c) Phase
d) Angle
Answer: a
Explanation: In linear modulation technique, the amplitude of transmitted signal varies linearly with modulating digi
tal signal. It is a form of digital modulation technique.
a) True
b) False
Answer: b
Explanation: Linear modulation techniques are bandwidth efficient. They are used in wireless communication syste
ms when there is an increasing demand to accommodate more and more users within a limited spectrum.
a) OQPSK
b) π/4 QPSK
c) FSK
d) BPSK
Answer: c
Explanation: OQPSK, π/4 QPSK and BPSK are the most popular linear modulation techniques. They have very goo
d spectral efficiency. However, FSK is an non-linear modulation technique.
4. In BPSK, the ________ of constant amplitude carrier signal is switched between two values according to the two
possible values.
a) Amplitude
b) Phase
c) Frequency
d) Angle
Answer: b
Explanation: In binary phase shift keying (BPSK), the phase of a constant amplitude carrier signal is switched betwe
en two possible values m1 and m2. These two values corresponds to binary 1 and 0 respectively.
a) True
b) False
Answer: b
Explanation: BPSK uses coherent or synchronous demodulation. It requires the information about the phase and freq
uency of the carrier be available at the receiver.
a) True
b) False
Answer: b
Explanation: Differential phase shift keying uses noncoherent form of phase shift keying. Noncoherent form avoids t
he need for a coherent reference signal at the receiver. Noncoherent receivers are also easy and cheap to build.
8. In DPSK system, input signal is differentially encoded and then modulated using a ________ modulator.
a) Amplitude
b) Frequency
c) BPSK
d) QPSK
Answer: c
Explanation: In DPSK system, input binary sequence is first differentially encoded and then modulated using a BPS
K modulator. The differentially encoded sequence is generated from input binary sequence by complimenting their
modulo-2 sum.
a) Superior
b) Same
c) Zero
d) Inferior
Answer: d
Explanation: The energy efficiency of DPSK is inferior to that of coherent PSK by about 3 dB. But, it has an advant
age of reduced receiver complexity.
a) Twice
b) Same
c) Half
d) Four times
Answer: a
Explanation: Quadrature phase shift keying (QPSK) has twice the bandwidth of BPSK. It is because two bits are tra
nsmitted in a single modulation symbol. The phase of the carrier takes on one of the four equally spaced values, whe
re each value of phase corresponds to a unique pair of message bit.
11. QPSK provides twice the bandwidth efficiency and _______ energy efficiency as compared to BPSK.
a) Twice
b) Half
c) Same
d) Four times
Answer: c
Explanation: The bit error probability of QPSK is identical to BPSK but twice as much data can be sent in the same
bandwidth. Thus, when compared to BPSK, QPSK provides twice the spectral efficiency with exactly the same effic
iency.
a) Identical
b) Twice
c) Half
d) Four times
Answer: a
Explanation: The spectrum of an OQPSK signal is identical to that of QPSK signal. Hence, both signals occupy the
same bandwidth. The staggered alignment of the even and odd bit streams in OQPSK signal does not change the nat
ure of spectrum.
14. QPSK signals perform better than OQPSK in the presence of phase jitter.
a) True
b) False
Answer: b
Explanation: OQPSK signal perform better than QPSK in the presence of phase jitter. It is due to the presence of noi
sy reference signal at the receiver.
15. Which of the following is not a detection technique used for detection of π/4 QPSK signals?
1. In non-linear modulation, the amplitude of the carrier varies with the variation of modulating signal.
a) True
b) False
Answer: b
Explanation: In non-linear modulation, the amplitude of the carrier is constant regardless of the variation in the mod
ulating signal. Many practical mobile radio communication systems use these types of nonlinear modulation method
s.
2. In constant envelope family of modulation, class C amplifiers introduces degradation in spectrum occupancy.
a) True
b) False
Answer: b
Explanation: The constant envelope family of modulation has an advantage of satisfying various conditions. In this,
power efficient Class C amplifiers can be used without introducing degradation in the spectrum occupancy of the tra
nsmitted signal.
3. Constant envelope modulation techniques occupy ______ bandwidth than linear modulation schemes.
a) Larger
b) Smaller
c) Same
d) Twice
Answer: a
Explanation: Constant envelope modulation technique occupies a larger bandwidth than linear modulation technique
. It is one of the disadvantage of constant envelope modulation. It is not well suited where bandwidth efficiency is m
ore important than power efficiency.
4. In BFSK __________ of constant amplitude carrier signal is switched between two values.
a) Phase
b) Angle
c) Frequency
d) Amplitude
Answer: c
Explanation: In BFSK, the frequency of a constant amplitude carrier signal is switched between two values accordin
g to the two possible message states. These states are called high and low tunes, which corresponds to binary 1 or 0.
a) 0.1
b) 1
c) 0.5
d) 0
Answer: c
Explanation: Minimum shift keying is a special type of CPFSK. Its peak frequency deviation is equal to ¼ the bit rat
e. In other words, MSK is continuous phase FSK with a modulation index of 0.5.
a) Amplitude modulation
b) Phase modulation
c) QPSK
d) Frequency modulation
Answer: d
Explanation: The modulation index of an FSK signal is similar to FM modulation index. It is defined by (2∆F)/Rb.
Here ∆F is the peak RF frequency and Rb is the bit rate.
a) Frequency separation
b) Amplitude separation
c) Phase change
d) Amplitude deviation
Answer: a
Explanation: The name minimum phase shift keying implies minimum frequency separation, i.e. the bandwidth that
allows orthogonal detection. A modulation index of 0.5 corresponds to the minimum frequency spacing that allows t
wo FSK signals to be coherently orthogonal.
a) Slow FSK
b) Fast FSK
c) Slow PSK
d) Fast PSK
Answer: b
Explanation: Minimum shift keying is sometimes also referred as fast FSK. It is so called because frequency spacing
used is only half as much as that used in conventional noncoherent frequency shift keying.
a) True
b) False
Answer: a
Explanation: Yes, MSK can be thought of as a special form of offset quadrature phase shift keying. The condition is
that baseband rectangular pulses are replaced with half sinusoidal pulses.
a) Integral
b) Opposite
c) Derivative
d) Similar
Answer: c
Explanation: Gaussian minimum phase shift keying is a simple binary modulation scheme. It is viewed as a derivati
ve of MSK. GMSK considerably reduces the sidelobe levels in the transmitted spectrum.
a) Minimum ISI
b) Minimum error rate
c) Good spectral efficiency
d) Variable envelope property
Answer: c
Explanation: GMSK sacrifices the irreducible error rate caused by partial response signalling in exchange for extrem
ely good spectral efficiency and constant envelope properties. And the premodulation Gaussian filtering introduces I
SI in the transmitted signal.
a) True
b) False
Answer: b
Explanation: MSK has simple demodulation and synchronization circuits. It has various other advantages like contin
uous phase property makes it highly desirable for highly reactive loads. Due to these advantages, MSK is a popular
modulation scheme for mobile radio communication.
a) MPSK
b) PSK
c) BPSK
d) QPSK
Answer: a
Explanation: M-ary phase shift keying (MPSK) is a combined linear and constant envelope technique. It is a part of
M-ary modulation techniques. These modern modulation techniques exploit the fact that digital baseband data may b
e sent by varying both the envelope and phase of an RF carrier.
2. In an M-ary signalling scheme two or more bits are grouped together to form a _______
a) Chip
b) Symbol
c) Byte
d) Pattern
Answer: b
Explanation: In an M-ary signalling scheme two or more bits are grouped together to form symbols. And one of the
M possible signals is transmitted during each symbol period of duration Ts.
3. The number of possible signal in M-ary signalling is given by M and M = __________ where n is an integer.
a) n
b) 2n
c) 2n
d) n2
Answer: c
Explanation: Two or more bits are grouped to form a symbol in M-ary modulation. And the number of possible sym
bols should be equal to 2n, where n is an integer.
a) True
b) False
Answer: b
Explanation: Timing errors increase when smaller distances between signals in the constellation diagram are used.
M-ary signalling techniques are attractive for use in bandlimited channel, but are limited in their applications due to
sensitivity in timing jitter.
a) True
b) False
Answer: b
Explanation: M-ary modulation schemes have poor power efficiency, but they have a better bandwidth efficiency. A
n 8-PSK system requires a bandwidth that is 3 times smaller than a BPSK system, whereas its BER performance is v
ery worse since signals are packed more closely in the signal constellation.
a) Amplitude
b) Frequency
c) Angle
d) Phase
Answer: d
Explanation: In an M-ary PSK, the carrier phase takes one of the M possible values. The possible values of phase ar
e θi=2(i-1)/M, where i=1,2,…….,M.
7. The constellation of M-ary PSK is ____________ dimensional.
a) One
b) Does not exist
c) Two
d) Three
Answer: c
Explanation: The constellation of M-ary PSK is two dimensional. It is due to the presence of two basis signals. And
the M-ary message points are equally spaced on a circle.
8. What is the radius of the circle in M-ary PSK on which message points are equaly spaced?
a) √Es
b) √Eb
c) Eb
d) Es
Answer: a
Explanation: The M-ary message points are equally spaced on a circle of radius √Es centred at the origin. Here Es is
energy per symbol. Thus, MPSK is a constant envelope signal when no pulse shaping is used.
a) Increases, same.
b) Increases, decreases
c) Increases, increases
d) Decreases, same
Answer: c
Explanation: The first null bandwidth of M-ary PSK signals decrease as M increases while Rb is held constant. Ther
efore, as the value of M increases, the bandwidth efficiency also increases.
10. The power efficiency of the M ary PSK decreases because of the _____
a) Varied, constant
b) Varied, varied
c) Constant, varied
d) Constant, constant
Answer: b
Explanation: Quadrature amplitude modulation (QAM) is obtained by allowing the amplitude to also vary with the p
hase. Thus, the constellation consists of square lattice of signal points.
a) True
b) False
Answer: b
Explanation: M-ary QAM does not have constant energy per symbol. It also does not have constant distance betwee
n possible symbol states. It reasons that particular values of M-ary QAM signal will be detected with higher probabil
ity than others.
13. In comparison to M-ary PSK, M-ary QAM bandwidth efficiency is _____ and power efficiency is ________
a) Identical, superior
b) Less, superior
c) Identical, identical
d) Superior, superior
Answer: a
Explanation: The power spectrum and bandwidth efficiency of QAM modulator is identical to M-ary PSK modulati
on. But, in terms of power efficiency QAM is superior to M-ary PSK.
14. The bandwidth efficiency of an M-ary FSK signal ________ with ________ in M.
a) Constant, increase
b) Increases, increase
c) Decreases, increase
d) Decreases, decrease
Answer: c
Explanation: The bandwidth efficiency of an M-ary FSK signal decreases with increase in M. Therefore, unlike M-P
SK signals, M-FSK signals are bandwidth inefficient.
1. The transmission bandwidth of spread spectrum techniques is equal to the minimum required signal bandwidth.
a) True
b) False
Answer: b
Explanation: Spread spectrum techniques employ a transmission bandwidth that is several orders of magnitude great
er than the minimum required signal bandwidth. On the other hand, primary objective of all the modulation schemes
is to minimize the required transmission bandwidth.
a) True
b) False
Answer: a
Explanation: PN sequence is usually generated using sequential logic circuits. When the feedback logic consists of e
xclusive OR gates, the shift register is called a linear PN sequence generator.
6. The period of a PN sequence produced by a linear m stage shift register cannot exceed _____ symbols.
a) 2m
b) m
c) 2m
d) 2m-1
Answer: d
Explanation: There are exactly 2m-1 non-zero states for an m stage feedback shift register. Thus, the period of a PN
sequence produced by a linear m stage shift register cannot exceed 2m-1.
7. DSSS system spreads the baseband signal by ________ the baseband pulses with a pseudo noise sequence.
a) Adding
b) Subtracting
c) Multiplying
d) Dividing
Answer: c
Explanation: A direct sequence spread spectrum (DS-SS) system spreads the baseband data by directly multiplying t
he baseband data pulses with a pseudo noise sequence. And the pseudo noise sequence is produced by a pseudo nois
e code generator.
a) Signal
b) Frequency
c) Phase
d) Amplitude
Answer: b
Explanation: Frequency hopping involves a periodic change of transmission frequency. A frequency hopping signal
is regarded as a sequence of modulated data bursts with time varying, pseudo random carrier frequencies.
a) Hopset
b) Hop
c) Chips
d) Symbols
Answer: a
Explanation: The set of possible carrier frequencies in FH-SS is called hopset. Hopping occurs of a frequency band t
hat includes a number of channels. Each channel is defined as a spectral region with central frequency in the hopset.
10. The bandwidth of the channel used in the hopset is called _________
a) Hopping bandwidth
b) Total hopping bandwidth
c) Instantaneous bandwidth
d) 3 dB bandwidth
Answer: c
Explanation: The bandwidth of a channel used in the hopset is called the instantaneous bandwidth. And the bandwid
th of the spectrum over which the hopping occurs is called total hopping bandwidth.
a) True
b) False
Answer: b
Explanation: It is possible to have collisions in an FH system where an undesired user transmits in the same channel
at the same time as the desired user. Whenever an undesired signal occupies a particular hopping channel in FH, the
noise and interference in the channel are translated in frequency.
13. In fast frequency hopping, hopping rate is less than the information symbol rate.
a) True
b) False
Answer: b
Explanation: Fast frequency hopping occurs if there is more than one frequency hop during each transmitted symbol
. Thus, in fast frequency hopping the hopping rate equals or exceeds the information symbol rate.
1. Bit error rate provides the information about the type of error.
a) True
b) False
Answer: b
Explanation: Bit error rate does not provide information about the type of error. However, bit error rate (BER) evalu
ation gives a good indication of the performance of a particular modulation scheme.
2. Which of the following is specified by a specific number of bit errors occurring in a given transmission?
a) Intersymbol interference
b) Random spectral spreading
c) Time varying Doppler spread
d) Blind speed
Answer: a
Explanation: Frequency selective fading is caused due to multipath delay spread which causes intersymbol interfere
nce. It results in an irreducible BER floor for mobile systems.
4. Irreducible BER floor is created in non frequency selective channels due to ____________
a) Intersymbol interference
b) Multipath time delay
c) Time varying Doppler spread
d) Blind speed
Answer: c
Explanation: Even if a mobile channel is not frequency selective, the tie varying Doppler spread due to motion creat
es an irreducible BER floor. It is caused due random spectral spreading.
a) True
b) False
Answer: a
Explanation: High capacity mobile systems are interference limited, but they are not noise limited. It was clearly see
n that when carrier to interference ratio (C/I) is large, the errors are primarily due to fading, and interference has ver
y little effect. However, as C/I drops below a certain level, interference dominates the link performance.
7. Which of the following do not impact bit error rate in mobile communication systems?
a) Mobile velocity
b) Channel delay spread
c) Modulation format
d) Base station
Answer: d
Explanation: The mobile velocity, channel delay spread, interference levels and modulation formats all independentl
y impact the raw bit error rate in mobile communication systems. And simulation is a powerful way to design or pre
dict the performance of wireless communication links.
a) Delay circuits
b) Correlators
c) Detectors
d) Flip flops
Answer: b
Explanation: A rake receiver uses multiple correlators to separately detect multiple strongest components. It is desig
ned to counter the effects of multipath fading.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
1. Which of the following is not used to improve received signal quality over small scale times and distance?
a) Modulation
b) Equalization
c) Diversity
d) Channel coding
Answer: a
Explanation: Equalization, diversity and channel coding are the three techniques which are used to improve received
signal quality and link performance over small scale times and distance. But, the approach, cost, complexity and eff
ectiveness varies in wireless communication system.
a) Diversity techniques
b) Channel coding techniques
c) Equalization techniques
d) Demodulation techniques
Answer: c
Explanation: General operating modes of an adaptive equalizer includes training and tracking. A known fixed length
training sequence is sent by the transmitter so that the receiver’s equalizer may adapt to a proper setting for minimu
m bit error rate detection.
a) Trained
b) Tracked
c) Installed
d) Used
Answer: a
Explanation: When an equalizer has been properly trained, it is said to have converged. Equalizers are commonly us
ed in digital communication systems where user data is segmented into short time blocks or time slots.
a) Equalizer algorithm
b) Equalizer structure
c) Time rate of change of multipath radio channel
d) Transmitter characteristics
Answer: d
Explanation: The timespan over which an equalizer converges is a function of the equalizer algorithm, the equalizer
structure and the time rate of change of the multipath radio channel. Equalizers require proper retraining in order to
maintain effective ISI cancellation.
a) Transmitter
b) Baseband or at IF in a receiver
c) Radio channel
d) Modulator stage
Answer: b
Explanation: An equalizer is implemented at baseband or at IF in a receiver. Since the baseband complex envelope e
xpression can be used to represent bandpass waveform, the channel response, the demodulated signal and adaptive e
qualizer algorithm are usually simulated and implemented at baseband.
a) Opposite
b) Same characteristics
c) Inverse filter
d) Add on
Answer: c
Explanation: An equalizer is actually an inverse filter of the channel. The goal of equalization is to satisfy that the co
mbination of the transmitter, channel and receiver be an all pass channel.
a) Error signal
b) Transmitted signal
c) Received signal
d) Channel impulse response
Answer: a
Explanation: The adaptive algorithm is controlled by the error signal. The error signal is derived by comparing the o
utput of the equalizer and some signal which is either an exact scaled replica of the transmitted signal or represents a
property of transmitted signal.
9. The adaptive algorithms in equalizer that do not require training sequence are called ________
2. Equalization is linear if an analog signal is fed back to change the subsequent outputs of the equalizer.
a) True
b) False
Answer: b
Explanation: If the analog signal is not used in the feedback path to adapt the equalizer, the equalization is linear. On
the other hand, if it is fed back to change the subsequent outputs of the equalizer, the equalization is non-linear.
a) Many zeroes
b) Poles only at z=0
c) Transfer function is a polynomial of z-1
d) Many poles
Answer: d
Explanation: Finite impulse response filter (FIR) has many zeroes but poles only at z=0. The transfer function of the
filter is a polynomial of z-1. It is also referred to as transversal filter.
a) Simple structure
b) Numerical stability
c) Faster convergence
d) Dynamic assignment
Answer: a
Explanation: The structure of lattice equalizer is more complicated than a linear transversal equalizer. But, numerica
l stability and faster convergence are two advantage of laatic equalizer. Also, its unique structure allows dynamic ass
ignment of the most effective length of lattice equalizer.
6. Non-linear equalizers are used in applications where channel distortion is not severe.
a) True
b) False
Answer: b
Explanation: Non-linear equalizers are used in applications where the channel distortion is too severe for a linear eq
ualizer to handle. They are most commonly used in practical wireless communication.
a) True
b) False
Answer: b
Explanation: LTE is well behaved when the channel spectrum is comparatively flat. But if the channel is severely di
storted or exhibits null in the spectrum, the performance of LTE deteriorates and MSE of DFE is better than LTE.
a) True
b) False
Answer: b
Explanation: Rather than decoding each received signal by itself, MLSE tests all possible data sequences by using a
channel impulse response simulator within the algorithm. It chooses the data sequence with maximum probability as
the output.
1. Which of the following factor could not determine the performance of algorithm?
a) Structural properties
b) Rate of convergence
c) Computational complexity
d) Numerical properties
Answer: a
Explanation: The performance of an algorithm is determined by various factors. These factors are rate of convergenc
e, computational complexity and numerical properties. The performance of algorithm does not depend on structural
properties.
a) Time span
b) Number of iterations
c) Accuracy
d) Complexity
Answer: b
Explanation: Rate of convergence is required as number of iterations required for the algorithm to converge close en
ough to the optimum solution. It enables the algorithm to track statistical variations when operating in non stationary
environment.
a) Time
b) Number of iterations
c) Number of operations
d) Accuracy
Answer: c
Explanation: Computational complexity is the number of operations required to make one complete iteration of the a
lgorithm. It helps in comparing the performance with other algorithms.
5. Coherence time is dependent on the choice of the algorithm and corresponding rate of convergence.
a) True
b) False
Answer: a
Explanation: The choice of algorithm and its corresponding rate of convergence depends on the channel data rate an
d coherence time. The speed of the mobile unit determines the channel fading rate and the Doppler spread, which is
directly related to coherence time of the channel.
a) True
b) False
Answer: b
Explanation: ZF is not often used in wireless links as it neglects the effect of noise altogether. However, it performs
well for static channels with high SNR, such as local wired telephone links.
a) Computational complexity
b) Cost
c) Mean square error
d) Power density of output signal
Answer: c
Explanation: LMS equalizer is a robust equalizer. It is used to minimize mean square error (MSE) between the desir
ed equalizer output and the actual equalizer output.
10. For N symbol inputs, LMS algorithm requires ______ operations per iterations.
a) 2N
b) N+1
c) 2N+1
d) N2
Answer: c
Explanation: The LMS algorithm is the simplest algorithm. For N symbol inputs, it requires only 2N+1 operations p
er iteration.
13. Which of the following does not hold true for RLS algorithms?
a) Complex
b) Adaptive signal processing
c) Slow convergence rate
d) Powerful
Answer: c
Explanation: Recursive least square (RLS) algorithm uses fast convergence rate as opposed to LMS algorithms. The
y are powerful, albeit complex, adaptive signal processing techniques which significantly improves the convergence
of adaptive equalizer.
a) True
b) False
Answer: b
Explanation: Unlike equalization, diversity requires no training overhead since a training sequence is not required by
the transmitter. Diversity is a powerful communication receiver technique that provides wireless link improvement
at a relatively low cost.
a) Receiver
b) Transmitter
c) Channel
d) Adaptive algorithms
Answer: a
Explanation: In virtually all applications, diversity decisions are made by the receiver and are unknown to the trans
mitter. Diversity exploits the random nature of radio propagation by finding independent signal paths for communic
ation.
a) Modulation
b) Demodulation
c) Macroscopic diversity technique
d) Microscopic diversity technique
Answer: d
Explanation: In order to prevent deep fades from occurring, microscopic diversity techniques can exploit the rapidly
changing signal. By selecting the best signal at all times, a receiver can mitigate small scale fading effects.
a) Modulation
b) Demodulation
c) Macroscopic diversity technique
d) Microscopic diversity technique
Answer: c
Explanation: Large scale fading is mitigated with macroscopic diversity techniques. It is done by selecting a base sta
tion which is not shadowed when others are, the mobile can improve substantially the average signal to noise ratio.
a) Antenna diversity
b) Time diversity
c) Frequency diversity
d) Polarization diversity
Answer: a
Explanation: Space diversity is also known as antenna diversity. It is one of the popular forms of diversity used in w
ireless communications. Signals received from the spatially separated antenna on the mobile would have essentially
uncorrelated envelopes for antenna separation.
a) Selection diversity
b) Time diversity
c) Feedback diversity
d) Equal gain diversity
Answer: b
Explanation: Space diversity reception methods can be classified into four categories. They are selection diversity, f
eedback diversity, maximal ratio combining and equal gain diversity.
8. In selection diversity, the gain of each diversity branch provides different SNR.
a) True
b) False
Answer: b
Explanation: Selection diversity uses m demodulators to provide m diversity branches. Their gain is adjusted to prov
ide the same average SNR for each branch.
a) Modulation index
b) Carrier frequency
c) Reflection coefficient
d) Coherence time
Answer: c
Explanation: Decorrelation of the signal in each polarization is caused by multiple reflections in the channel betwee
n mobile and base station antenna. Reflection coefficient for each polarization is different, which results in different
amplitudes and phases for each reflection.
10. Which of the factor does not determine the correlation coefficient?
a) Polarization angle
b) Cross polarization discrimination
c) Offset angle from the main beam direction
d) Coherence time
Answer: d
Explanation: The correlation coefficient is determined by three factors, polarization angle, offset angle from the mai
n beam direction of the diversity antenna, and the cross polarization discrimination. The correlation coefficient gener
ally becomes higher as offset angle becomes large.
11. Frequency diversity is implemented by transmitting information on more than one ___________
a) Carrier frequency
b) Amplitude
c) Phase
d) Modulation scheme
Answer: a
Explanation: Frequency diversity is implemented by transmitting information on more than one carrier frequency. Fr
equency diversity is often employed in microwave line of sight links which carry several channels in frequency divis
ion multiplex mode.
a) Correlation coefficient
b) Coherence time
c) Coherence bandwidth
d) SNR
Answer: c
Explanation: The rationale behind the frequency diversity is that frequencies separated by more than the coherence b
andwidth of the channel will be uncorrelated. Thus, they will not experience the same fade.
a) True
b) False
Answer: b
Explanation: Frequency diversity is not good for low traffic conditions. This technique has a disadvantage that it not
only requires spare bandwidth but also requires that there be as many receivers as there are channels used for freque
ncy diversity. However, for critical traffic, the expense may be justified.
14. Time diversity repeatedly transmits information at time spacings that exceed ___________
a) Coherence bandwidth
b) Dwell time
c) Run time
d) Coherence time
Answer: d
Explanation: Time diversity repeatedly transmits information at time spacings that exceed coherence time of the cha
nnel. Thus, multiple repetitions of the signal will be received with independent fading conditions, thereby providing
for diversity.
1. In CDMA spread spectrum systems, chip rate is less than the bandwidth of the channel.
a) True
b) False
Answer: b
Explanation: In CDMA spread spectrum systems, the chip rate is typically much greater than the flat fading bandwid
th of the channel. Whereas conventional modulation techniques require an equalizer to undo intersymbol interferenc
e between adjacent channels.
a) Time shifted
b) Amplitude shifted
c) Frequency shifted
d) Phase shifted
Answer: a
Explanation: RAKE receiver attempts to collect the time shifted versions of the original signal. It is due to the fact th
at there is useful information present in the multipath components.
3. RAKE receiver uses separate _________ to provide the time shifted version of the signal.
a) IF receiver
b) Equalizer
c) Correlation receiver
d) Channel
Answer: c
Explanation: RAKE receiver uses separate correlation receivers to provide the time shifted version of the original si
gnal for each of the multipath signal. CDMA receivers combine these time shifted versions of the original signal to t
ransmission in order to improve the signal to noise ratio of the receiver.
a) Frequency shift
b) Amplitude change
c) Phase shift
d) Time delay
Answer: d
Explanation: Each correlation receiver may be adjusted in time delay, so that a microprocessor controller can cause
different correlation receivers to search in different time windows for significant multipath.
5. The range of time delays that a particular correlator can search is called ________
a) Search window
b) Sliding window
c) Time span
d) Dwell time
Answer: a
Explanation: The range of time delays that a particular correlator an search is called a search window. RAKE receiv
er attempts to collect the time shifted version of the original signal by providing a separate correlation receiver for ea
ch of the multipath signal.
a) CDMA
b) TDMA
c) FDMA
d) OFDM
Answer: a
Explanation: RAKE receiver is essentially a diversity receiver which is used specifically for CDMA. It uses the fact
that the multipath components are practically uncorrelated from one another when their relative propagation delays e
xceed a chip period.
a) Single correlator
b) Multiple correlator
c) Single IF receiver
d) Multiple IF receivers
Answer: b
Explanation: A RAKE receiver uses multiple correlators to separately detect the M strongest multipath components.
Demodulation and bit decisions are then based on the weighted ouputs of the M correlators.
8. In a RAKE receiver, if the output from one correlator is corrupted by fading, all the other correlator’s output are a
lso corrupted.
a) True
b) False
Answer: b
Explanation: In a RAKE receiver, if the output from one correlator is corrupted by fading, the others may not be. An
d the corrupted signal may be discounted through weighting process.
9. A RAKE receiver uses __________
a) Equalization
b) Channel coding
c) Diversity
d) Encryption
Answer: c
Explanation: RAKE receiver is a diversity receiver. Diversity is provided by the fact that the multipath components
are practically uncorrelated from one another when their relative propagation delays exceed chip period.
a) Time
b) Frequency
c) Polarization
d) Antenna
Answer: a
Explanation: Interleaving is used to obtain time diversity in a digital communication system without adding any over
head. It provides rapid proliferation of digital speech coders which transform analog voices into efficient digital mes
sages.
a) Added
b) Subtracted
c) Multiplied
d) Divided
Answer: a
Explanation: In block codes, parity bits are added to the block of message bits to make codewords or code blocks. T
hey enable a limited number of errors to be detected and corrected without retransmission.
2. How many redundant bits are added in block codes for k information bits and n code bits?
a) n+k
b) n-k
c) k2
d) n2
Answer: b
Explanation: In block encoder, k information bits are encoded into n code bits. A total of n-k redundant bits are adde
d to the k information bits for the purpose of detecting and correcting errors.
a) n2/k
b) k2/n
c) n/k
d) k/n
Answer: c
Explanation: The block code is referred to as an (n,k) code, and the rate of the code is defined as R=n/k. It is equal t
o the rate of information divided by the raw channel rate.
4. The ability of the block code to correct errors is a function of __________
a) Linearity
b) Systematic
c) Cyclic
d) Non linearity
Answer: d
Explanation: Block codes are linear, systematic and cyclic in nature. Encoding and decoding techniques make use of
mathematical constructs known as finite fields.
a) Beginning
b) End
c) End
d) Odd places
Answer: b
Explanation: A systematic code is one in which the parity bits are appended to the end of the information bits. For a
n (n,k) code, the first k bits are identical to the information bits, and the remaining (n-k) bits of each code word are li
near combinations of k information bits.
a) Hamming code
b) Cyclic code
c) Convolution code
d) BCH codes
Answer: c
Explanation: Hamming codes, cyclic codes and BCH codes are the example of block codes. Convolution code does
not come in the category of block code. Some other examples of block codes are Reed Solomon codes, Golay codes
and Hadamard codes.
10. Which of the following linear codes achieve largest possible minimum distance?
a) Hamming code
b) Hadamard code
c) Golay code
d) Reed Solomon codes
Answer: d
Explanation: RS codes achieve the largest possible minimum distance, dmin of any linear code. They are non-binary
codes which are capable of correcting errors that appears in bursts.
1. Block codes can achieve a larger coding gain than convolution coding.
a) True
b) False
Answer: b
Explanation: Convolution code can achieve a larger coding gain that can be achieved using a block coding with the s
ame complexity. Their mapping is highly structured, enabling a decoding method considerably different from block
codes.
2. Which of the following indicates the number of input bits that the current output is dependent upon?
a) Constraint length
b) Code length
c) Search window
d) Information rate
Answer: a
Explanation: Constraint length determines the number of input data bits that the current output is dependent upon. T
he constraint length determines how powerful and complex the code is.
a) Viterbi algorithm
b) Stack algorithm
c) Fano’s sequential coding
d) Ant colony optimization
Answer: d
Explanation: There are a number of techniques for decoding convolution codes. The most important of these method
s is Viterbi algorithm. Other decoding algorithms for convolutional codes are Fano’s sequential coding, stack algorit
hm and feedback coding.
a) Maximum likelihood
b) Maximum a posteriori
c) Minimum square
d) Minimum mean square
Answer: a
Explanation: Viterbi algorithm performs maximum likelihood decoding of convolutional codes. The algorithm was f
irst developed by A.J. Viterbi. It is one of the most important algorithm used for decoding convolutional codes.
6. Fano’s algorithm searches all the paths of trellis diagram at same time to find the most probable path.
a) True
b) False
Answer: b
Explanation: Fano’s algorithm searches for the most probable path through the trellis diagram by examining one pat
h at a time. The error rate performance of Fano’s algorithm is comparable to Viterbi’s algorithm.
7. Which of the following is not an advantage of Fano’s algorithm in comparison to Viterbi’s algorithm?
a) Less storage
b) Large constraint length
c) Error rate
d) Small delays
Answer: d
Explanation: In comparison to Viterbi decoding, sequential decoding has a significantly larger delay. In advantage o
ver Viterbi decoding is that it requires less storage, and thus codes with larger constraint lengths can be employed.
a) True
b) False
Answer: b
Explanation: In comparison to Fano’s algorithm, the stack algorithm is computationally simpler since there is no retr
acting over the same path. But stack algorithm requires more storage than Fano’s algorithm.
9. Which of the following is not an error correction and detection code?
a) Block code
b) Convolutional codes
c) Passive codes
d) Turbo codes
Answer: c
Explanation: There are three basic types of error correction and detection codes. They are block codes, convolutiona
l codes and turbo codes. A channel coder operates on digital message data by encoding the source information into a
code sequence.
10. Which decoding method involves the evaluation by means of Fano’s algorithm?
a) Survivors
b) Defenders
c) Destroyers
d) Carriers
Answer: a
Explanation: In Viterbi’s algorithm, the selected paths are regarded as survivors. The path thus defined is unique and
corresponds to the decoded output.
1. The higher the bit rate, the more speech channels can be compressed within a given bandwidth.
a) True
b) False
Answer: b
Explanation: The lower the bit rate at which the coder can deliver toll quality speech, the more speech channels can
be compressed within a given bandwidth. Thus, manufacturers are continuously in search of speech coders that prov
ide toll quality speech at lower bit rates.
a) Maximum, moderate
b) Maximum, high
c) Minimal, moderate
d) Minimal, high
Answer: c
Explanation: Waveform coders have minimal complexity. This class of coders achieves only moderate economy in t
ransmission bit rate. They are designed to be source independent and hence code equally well a variety of signals.
4. Vocoders has _______ complexity and achieves _______ economy in transmission bit rate.
a) Maximum, moderate
b) Maximum, high
c) Minimal, moderate
d) Minimal, high
Answer: b
Explanation: Vocoders achieve very high economy in transmission bit rate. They are in general more complex. They
are based on using a priori knowledge about the signal to be coded, and for this reason, they are signal specific.
a) Bandlimited
b) Bandpass
c) High pass
d) Infinite bandwidth
Answer: a
Explanation: The most basic property of speech waveforms that are exploited by all speech coders is that they are ba
ndlimited. A finite bandwidth means that it can be time-discretized at a finite rate and reconstructed complexity fro
m its samples.
a) Non uniformity
b) Very high probability of non-zero amplitudes
c) Significant probability of very high amplitudes
d) Increasing function of amplitudes between these extremes
Answer: d
Explanation: There is a non-uniform probability distribution of speech amplitude. The pdf of a speech signal is in ge
neral characterized by a very high probability of non-zero amplitudes, a significant probability of very high amplitud
es, and a monotonically decreasing function of amplitudes between these extremes.
8. Auto correlation function measures______ between samples of a speech signal as a function of _______
a) Similarity, frequency
b) Dissimilarity, time
c) Similarity, time
d) Dissimilarity, frequency
Answer: c
Explanation: The autocorrelation function (ACF) gives a quantitative measure of the closeness or similarity between
samples of a speech signal as a function of their time separation. In every sample of speech, there is a large compon
ent that is easily predicted from the values of the previous samples.
a) True
b) False
Answer: b
Explanation: There is a nonflat characteristic in power spectral density of speech. It makes it possible to obtain signi
ficant compression by coding speech in the frequency domain.
11. Low frequency signals contribute very little to the total speech signals.
a) True
b) False
Answer: b
Explanation: Lon term averaged PSD’s of speech show that high frequency signals contribute very little to the total s
peech energy. However, high frequency components are insignificant in energy, they are very important carriers of s
peech information.
1. Quantization is a process of mapping a ________ range of amplitude of a signal into a finite set of __________ a
mplitudes.
a) Continuous, discrete
b) Discrete, continuous
c) Discrete, discrete
d) Continuous, continuous
Answer: a
Explanation: Quantization is a process of mapping a continuous range of amplitude of a signal into a finite set of dis
crete amplitudes. Quantizers are the devices that remove the irrelevancies in the signal.
3. Distortion produced by quantization is directly proportion to ________ and inversely proportional to ______
a) 6.02n + α
b) 3n + 6.02α
c) n + 6.02α
d) 6.02n + α
Answer: d
Explanation: Signal to quantization noise (SQNR) ratio of a PCM encoder is related to the number of bits, n used for
encoding. It follows the following relation, SQNR= 6.02n + α. Here, α = 4.77 dB for peak SQNR and α = 0 dB for a
verage SQNR.
a) μ law
b) A law
c) Hybrid companding
d) Direct companding
Answer: a
Explanation: Companding technique known as μ law is used in US. In Europe, A law companding technique is used.
6. An adaptive quantizer varies its ___________ in accordance to input speech signal power.
a) Level
b) Step size
c) Amplitude
d) Frequency
Answer: b
Explanation: An adaptive quantizer varies its step size in accordance to the input speech signal power. Its characteris
tics shrink and expand in time like an accordion.
7. Shannon predicted that better performance can be achieved by coding one sample at a time.
a) True
b) False
Answer: b
Explanation: Shannon predicted that better performance can be achieved by coding many samples at a time instead o
f one sample at a time.
a) Adaptive quantization
b) Uniform quantization
c) Vector quantization
d) Non-uniform quantization
Answer: c
Explanation: Vector (VQ) quantization is a delayed decision coding technique. It maps a group of input samples call
ed a vector to a code book index. A code book is set up consisting of a finite set of vectors covering the entire antici
pated range of values.
a) Continuous in nature
b) Logarithmic in nature
c) Linear in nature
d) Discrete in nature
Answer: a
Explanation: In the μ law companding, the compressor characteristic is continuous. It approximates the linear depen
dence on x for low input signals and a logarithmic one for high input signals.
11. In Adaptive Delta Modulation, the slope error reduces and ___________
2. In frequency domain coding of speech, the number of bits used to encode each frequency component is constant.
a) True
b) False
Answer: b
Explanation: Frequency domain coders have an advantage that number of bits used to encode each frequency compo
nent can be dynamically varied. They can also be shared among different bands.
a) Linear
b) Direct
c) Non-linear
d) Indirect
Answer: c
Explanation: Quantization is a non-linear process. It produces distortion products that are typically broad in spectru
m.
4. Sub band coding codes the short time transform of a windowed signal.
a) True
b) False
Answer: b
Explanation: It is function of block transform coding. However, a sub band coder divides the speech signal into man
y smaller sub bands and encodes each sub band separately according to some perceptual criterion.
5. Which of the following is one of the most frequently used transform in speech coding?
a) Fourier transform
b) Wavelet transform
c) Shearlet transform
d) Discrete cosine transform
Answer: d
Explanation: DCT (discrete cosine transform) is one of the most attractive and frequently used transforms for speech
coding. Fast algorithms developed for computing the DCT in a computationally efficient manner are used.
8. The type of frequency domain coding that divides the speech signal into sub bands is _____
a) Waveform coding
b) Vocoders
c) Block transform coding
d) Sub-band coding
Answer: d
Explanation: Sub band coding (SB
c) is a method where the speech signal is subdivided into several frequency bands and each band is digitally encoded
separately. The audible frequency spectrum 20Hz-20 KHz is divided into frequency sub-bands using a bank of finit
e impulse response (FIR) filter and output of each filter is sampled and encoded.
10. The speech coding technique that is dependent on the prior knowledge of the signal is __________
a) Waveform coders
b) Vocoders
c) Sub band coding
d) Block transform
Answer: b
Explanation: Vocoders are dependent on the prior knowledge of the signals. They capture the characteristic elements
of audio signal and then uses this characteristic signal to affect other audio signals.
a) Transmitter
b) Receiver
c) Channel
d) IF Filter
Answer: a
Explanation: Vocoders are a class of speech coding systems. They analyse the speech signal at the transmitter. And t
hen transmit the parameters derived from the analysis.
a) True
b) False
Answer: b
Explanation: Vocoders are much more complex than the waveform coders. They can achieve very high economy in t
ransmission bit rate but are less robust.
a) ‘f’
b) ‘s’
c) ‘sh’
d) ‘m’
Answer: d
Explanation: Voiced sounds are ‘m’, ‘n’ and ‘v’ pronounciations. They are a result of quasiperiodic vibrations of the
vocal chord.
a) Voiced, unvoiced
b) Active, passive
c) Direct, indirect
d) Balanced, unbalanced
Answer: a
Explanation: Speech signal is of two types, voiced and unvoiced. Voiced sound is a result of quasiperiodic vibration
s of the vocal chord. Unvoiced signals are fricatives produced by turbulent air flow through a constriction.
a) True
b) False
Answer: b
Explanation: Channel vocoders are frequency domain vocoders. They determine the envelope of the speech signal fo
r a number of frequency bands and then sample, encode and multiplex these samples with the encoded outputs of the
other filters.
a) Pitch frequency
b) Voice pitch
c) Pole frequency
d) Central frequency
Answer: c
Explanation: The pole frequencies correspond to the resonant frequencies of the vocal tract. They are often called th
e formants of the speech signal. For adult speakers, the formants are centered around 500 Hz, 1500 Hz, 2500 Hz and
3500 Hz.
a) True
b) False
Answer: b
Explanation: Formant vocoders use fewer control signals. Therefore, formant vocoders can operate at lower bit rates
than the channel vocoder. Instead of transmitting the power spectrum envelope, formant vocoders attempt to transm
it the position of peaks of spectral envelope.
a) Wavelet transform
b) Inverse wavelet transform
c) Cosine transform
d) Inverse Fourier transform
Answer: d
Explanation: Cepstrum vocoders use inverse Fourier transform. It separates the excitation and vocal tract spectrum b
y Fourier transforming spectrum to produce the cepstrum of the signal.
a) Time
b) Frequency
c) Direct
d) Indirect
Answer: a
Explanation: Linear predictive vocoders belong to the time domain class of vocoders. This class of vocoders attempt
s to extract the significant features of the speech from the time waveform.
a) True
b) False
Answer: b
Explanation: Linear predictive coders are computationally intensive. But, they are the most popular among the class
of low bit vocoders. With LPC, it is possible to transmit good quality voice at 4.8 kbps and poorer quality voice at e
ven lower rates.
3. Linear predictive coding system models the vocal tract as __________ linear filter.
6. How many past samples are used by linear predictive coders to estimate present sample?
a) 100-150
b) 10-15
c) 1
d) 1000-1100
Answer: b
Explanation: LPCs uses weighted sum of past p samples to estimate the present samples. The number of past sample
s used by linear predictive coders ranges from 10 to 15.
7. Which of the non-linear transform is generally used to improve the coding of reflection coefficient?
9. Which of the following LPC produces a buzzy twang in the synthesized speech?
10. The problem of buzzy twang in synthesized speech is mitigated by multipulse excited LPC or code excited LPC.
a) True
b) False
Answer: a
Explanation: LPC vocoder produces buzzy twang in the synthesized speech due to phase coherence between the har
monic components of the excitation pulses. This problem is mitigated by multipulse excited or code excited LPC.
a) True
b) False
Answer: b
Explanation: Multipulse excited LPC does not require pitch detection and the prediction residual is better approxima
ted by several pulses per pitch period. This is the reason for better speech quality.
1. The choice of speech coder does not depend on cell size used.
a) True
b) False
Answer: b
Explanation: The choice of speech coder depends on the cell size used. When the cell size is sufficiently small such t
hat high spectral efficiency is achieved through frequency reuse, it may be sufficient to use a simple high rate speech
codec.
2. Which of the following is an important factor in determining spectral efficiency of the system?
3. The type of modulation does not affect the choice of speech codec.
a) True
b) False
Answer: b
Explanation: The type of modulation employed has a considerable impact on the choice of speech codec. Using ban
dwidth efficient modulation scheme can lower the bit rate reduction requirements on the speech codec and vice vers
a.
4. Which of the following is the name of original speech coder used in the pan European digital cellular standard GS
M?
7. RPE-LTP codec combines the advantage of RELP codec and CELP codec.
a) True
b) False
Answer: b
Explanation: The RPE-LTP codec combines the advantages of the earlier French proposed RELP codec with those o
f the multipulse excited long term prediction (MPE-LTP) codec proposed by Germany.
a) CELP
b) MPE_LTP
c) RELP
d) RPE-LTP
Answer: a
Explanation: The VSELP speech coder is a variant of the CELP type vocoders. The code books in the VSELP encod
er are organised with a predefined structure such that a brute-force search is avoided.
12. ________ exaggerates the bit errors originally received at the base station.
1. Multiple access schemes are used to allow ________ mobile users to share simultaneously a finite amount of radi
o spectrum.
a) Many
b) One
c) Two
d) Ten-Fifteen
Answer: a
Explanation: Multiple access schemes are used to allow many mobile users to share simultaneously a finite amount
of radio spectrum. The sharing of spectrum is required to achieve high capacity by simultaneously allocating the ava
ilable bandwidth to multiple users.
2. The technique that makes possible the task of listening and talking in communication system is called ________
a) Simplexing
b) Duplexing
c) Modulating
d) Multiple access technique
Answer: b
Explanation: In conventional telephone systems, it is possible to talk and listen simultaneously. This effect is called
duplexing and is generally required in wireless telephone systems.
3. Frequency division duplexing provides ________ distinct bands of frequencies for _________ user.
a) Two, two
b) One, two
c) Two, one
d) Two, many
Answer: c
Explanation: Frequency division duplexing (FD
d) provides two distinct bands of frequencies for every user. In FDD, any duplex channel actually consists of two si
mplex channels.
4. The forward band in FDD provides traffic from the mobile to base station.
a) True
b) False
Answer: b
Explanation: The forward band in FDD provides traffic from the base station to the mobile. The reverse band provid
es traffic from the mobile to the base station.
5. The frequency separation between each forward and reverse channel changes throughout the system.
a) True
b) False
Answer: b
Explanation:The frequency separation between each forward and reverse channel is constant throughout the system.
It is regardless of the particular channel being used. A device called a duplexer is used inside each subscriber unit an
d base station to allow simultaneous bidirectional radio transmission.
6. Time division duplexing uses ________ to provide both a forward and reverse link.
a) Frequency
b) Time
c) Time and frequency
d) Cell spacing
Answer: b
Explanation: Time division duplexing (TD
d) uses time instead of frequency to provide both a forward and reverse link. In TDD, multiple users share a single r
adio channel by taking turns in the time domain.
8. In wideband systems, the transmission bandwidth of a single channel _________ coherence bandwidth of the cha
nnel.
a) Equal to
b) Not related to
c) Larger than
d) Smaller than
Answer: c
Explanation: In wideband systems, the transmission bandwidth of a single channel is much larger than the coherence
bandwidth of the channel. Thus, multipath fading does not greatly vary the received signal power within a wideban
d channel.
a) True
b) False
Answer: b
Explanation: In narrowband system, channels are usually operated using FDD. To minimize interference between fo
rward and reverse links on each channel, the frequency separation is made as great as possible within the frequency
spectrum.
10. Narrowband FDMA allows users to share the same radio channel allocating a unique time slot to each user.
a) True
b) False
Answer: b
Explanation: In narrowband FDMA, a user is assigned a particular channel which is not shared by other users in the
vicinity. However narrowband TDMA allows the users to share the same radio channel allocating a unique time slot
to each user.
a) Individual, individual
b) Many, individual
c) Individual, many
d) Many, many
Answer: a
Explanation: Frequency division multiple access (FDM
a) assigns individual channels to individual users. Each user is allocated a unique frequency band or channel. These
channels are assigned on demand to users who request service.
2. During the period of call, other users can share the same channel in FDMA.
a) True
b) False
Answer: b
Explanation: In FDMA systems, no other user can share the same channel during the period of call. In FDD systems,
the users are assigned a channel as a pair of frequencies; one is used for the forward channel while the other frequen
cy is used for the reverse channel.
a) Ten
b) Two
c) One
d) Several
Answer: c
Explanation: The FDMA channel carries one phone circuit at a time. Each individual band or channel is wide enoug
h to accommodate the signal spectra of the transmissions to be propagated.
a) True
b) False
Answer: b
Explanation: If an FDMA channel is not in use, it sits idle and cannot be used by other users to increase or share cap
acity. It is essentially a wasted resource.
a) Wide
b) Narrow
c) Large
d) Zero
Answer: b
Explanation: The bandwidth of FDMA channels is relatively narrow as each channel supports only one circuit per ca
rrier. That is, FDMA is usually implemented in narrow band systems.
6. The symbol time in FDMA systems is _________ thus intersymbol interference is ______
a) Large, high
b) Small, low
c) Small, high
d) Large, low
Answer: d
Explanation: The symbol time of a narrowband signal is large as compared to the average delay spread. This implies
that the amount of intersymbol interference is low and, thus, little or no equalization is required in FDMA narrowba
nd systems.
7. Due to _________ transmission scheme __________ bits are needed for overhead in FDMA systems.
a) Continuous, few
b) Discontinuous, few
c) Continuous, many
d) Discontinuous, many
Answer: a
Explanation: Since FDMA is a continuous transmission scheme, fewer bits are needed for overhead purposes (such
as synchronization and framing bits) as compared to TDMA.
8. Which of the following is not true for FDMA systems as compared to TDMA systems?
a) Low complexity
b) Lower cell site system cost
c) Tight RF filtering
d) Narrow bandwidth
Answer: b
Explanation: FDMA systems have higher cell site system costs as compared to TDMA systems. It is due to single ch
annel per carrier design, and the need to use costly bandpass filters to eliminate spurious radiation at the base station.
a) Intermodulation frequency
b) Intermediate frequency
c) Instantaneous frequency
d) Instrumental frequency
Answer: a
Explanation: Intermodulation (IM) frequency is undesired RF radiation which can interfere with other channels in th
e FDMA systems. The nonlinearities cause signal spreading in the frequency domain and generate IM frequency.
a) GSM
b) W-CDMA
c) Cordless telephone
d) AMPS
Answer: d
Explanation: The first US analog cellular system, the Advanced Mobile Phone System (AMPS) is based on FDMA/
FDD. A single user occupies a single channel while the call is in progress.
11. In US AMPS, 416 channels are allocated to various operators with 10 kHz guard band and channel between the
m is 30 kHz. What is the spectrum allocation given to each operator?
a) 12.5 kHz
b) 30 kHz
c) 12.5 MHz
d) 30 MHz
Answer: c
Explanation: Spectrum allocated to each cellular operator is 12.5 MHz. As Bt = NBc + 2Bguard; which is equal to 4
16*30*103+2(10*103) = 12.5 MHz.
a) True
b) False
Answer: b
Explanation: TDMA systems transmit data in a buffer and burst method. Thus, the transmission for any user is not c
ontinuous.
a) Address
b) Data
c) Guard bits
d) Trail bits
Answer: a
Explanation: TDMA frame is made up of a preamble, an information message and the trail bits. In a TDMA frame, t
he preamble contains the address and synchronization information that both the base station and the subscribers use t
o identify each other.
3. __________ are utilized to allow synchronization of the receivers between different slots and frames.
a) Preamble
b) Data
c) Guard bits
d) Trail bits
Answer: c
Explanation: Guard times are utilized to allow synchronization of the receivers between different slots and frames. T
DMA/FDD systems intentionally induce several time slots of delay between the forward and reverse time slots for a
particular user.
a) Continuous, complex
b) Continuous, simple
c) Discontinuous, complex
d) Discontinuous, simple
Answer: d
Explanation: Because of discontinuous transmissions in TDMA, the handoff process is much simpler for a subscribe
r unit, since it is able to listen for other base stations during idle time slots.
a) True
b) False
Answer: b
Explanation: TDMA has an advantage that it can allocate different numbers of time slots per frame to different users
. Thus, bandwidth can be supplied on demand to different users by concatenating or reassigning time slots based on
priority.
8. ___________ of TDMA system is a measure of the percentage of transmitted data that contains information as op
posed to providing overhead for the access scheme.
a) Efficiency
b) Figure of merit
c) Signal to noise ratio
d) Mean
Answer: a
Explanation: Efficiency of TDMA system is a measure of the percentage of transmitted data that contains informatio
n as opposed to providing overhead for the access scheme. The frame efficiency is the percentage of bits per frame
which contain transmitted data.
9. A TDMA system uses 25 MHz for the forward link, which is broken into radio channels of 200 kHz. If 8 speech c
hannels are supported on a single radio channel, how many simultaneous users can be accommodated?
a) 25
b) 200
c) 1600
d) 1000
Answer: d
Explanation: For a TDMA system that uses 25 MHz for the forward link, which is broken into radio channels of 200
kHz. If 8 speech channels are supported on a single radio channel, 1000 simultaneous users can be accommodated a
s N = (25 MHz)/(200 kHz/8).
10. What is the time duration of a bit if data is transmitted at 270.833 kbps in the channel?
a) 270.833 s
b) 3 μs
c) 3.692 μs
d) 3.692 s
Answer: c
Explanation: If data is transmitted at 270.833 kbps in the channel, the time duration of a bit will be 3.692 μs, as Tb =
(1/270.833 kbps) = 3.692 μs.
a) True
b) False
Answer: b
Explanation: Spread spectrum multiple access (SSM
a) uses signals which have a transmission bandwidth that is several orders of magnitude greater than the minimum re
quired RF bandwidth.
a) Narrowband, wideband
b) Wideband, narrowband
c) Unmodulated, modulated
d) Low frequency, high frequency
Answer: a
Explanation: A pseudo-noise (PN) sequence converts a narrowband signal to a wideband noise like signal before tra
nsmission. SSMA provides immunity to multipath interference and robust multiple access capability.
a) True
b) False
Answer: b
Explanation: SSMA is not very bandwidth efficient when used by a single user. However, since many users can shar
e the same spread spectrum bandwidth without interfering with one another, spread spectrum systems become band
width efficient in a multiple user environment.
4. ___________ is a digital multiple access system in which carrier frequencies are varied in pseudorandom order.
a) CDMA
b) FCDMA
c) FHMA
d) SDMA
Answer: c
Explanation: Frequency hopped multiple access (FHM
a) is a digital multiple access system in which the carrier frequencies of the individual users are varied in a pseudora
ndom fashion within a wideband channel.
5. If the rate of change of the carrier frequency is greater than the symbol rate, then the system is referred as ______
_____
a) Different
b) Two
c) Ten
d) Same
Answer: d
Explanation: All users in CDMA system use the same carrier frequency and may transmit simultaneously. Each user
has its own pseudorandom codeword which is approximately orthogonal to all other codewords.
8. ___________ problem occurs when many mobile users share the same channel.
a) Near-far
b) Activation
c) Line of sight
d) Windowing
Answer: a
Explanation: The near far problem occurs when many mobile users share the same channel. In general, the strongest
received mobile signal will capture the demodulator at a base station.
a) Equal
b) Greater
c) Slightly greater
d) Much less
Answer: d
Explanation: In CDMA, symbol (chip) duration is very short and usually much less than the channel delay spread. T
hus, channel data rates are very high in CDMA systems.
10. ____________ is used to improve reception by collecting time delayed versions of the required signal.
a) RAKE receiver
b) Equalizer
c) Frequency modulator
d) High pass filter
Answer: a
Explanation: A RAKE receiver can be used to improve reception by collecting time delayed versions of the required
signals. Since PN sequences have low autocorrelation, multipath which is delayed by more than a chip appear as noi
se.
11. ____________ arises from the fact that the spreading sequences of different users are not orthogonal.
a) Near-far problem
b) Line of sight
c) Windowing
d) Self jamming
Answer: d
Explanation: Self jamming arises from the fact that the spreading sequences of different users are not orthogonal. He
nce, in the despreading of a particular PN code, non zero contributions to the receiver decision statistic for the desire
d user arise from the transmissions of other users in the system.
1. In ___________ technique, many subscribers attempt to access a single channel in an uncoordinated manner.
a) Packet radio
b) Multiple access
c) Modulation
d) Spread spectrum
Answer: a
Explanation: In packet radio (PR) access techniques, many subscribers attempt to access a single channel in an unco
ordinated (or minimally coordinate
d) manner. Transmission is done by using bursts of data.
2. Packet radio uses _________ and __________ signals for perfect feedback.
a) Forward, reverse
b) ACK, NACK
c) Active, passive
d) Linear, non linear
Answer: b
Explanation: Packet radio uses ACK and NACK signals for perfect feedback. The ACK signal indicates an acknowl
edgment of a received burst and NACK indicates that the previous burst was not received correctly by base station.
a) True
b) False
Answer: b
Explanation: Packet radio multiple access is very easy to implement, but has low spectral efficiency and may induce
delays. The subscriber uses a contention technique to transmit on a common channel.
4. ___________ is defined as average number of messages successfully transmitted per unit time in packet radio mul
tiple access technique.
a) Average delay
b) Figure of merit
c) Throughput
d) Efficiency
Answer: c
Explanation: The performance of contention technique can be evaluated by the throughput (T), which is defined as t
he average number of messages successfully transmitted per unit time, and the average delay experienced by a typic
al message burst.
5. What is the time period during which the packets are susceptible to collisions with transmissions from other users
?
a) Delay time
b) Latency period
c) Average delay time
d) Vulnerable period
Answer: d
Explanation: Vulnerable period is the time period during which the packets are susceptible to collisions with transmi
ssions from other users. It is used in order to determine the throughput.
6. For a PR multiple access technique, packet transmissions occur with __________ distribution.
a) Poisson
b) Gaussian
c) Pearson
d) Rayleigh
Answer: a
Explanation: For a PR multiple access technique, packet transmissions occur with Poisson distribution. To study pac
ket radio protocols, it is assumed that all packets sent by all users have a constant packet length and fixed channel rat
e.
7. If λ is mean arrival rate and τ is the packet duration, then traffic occupancy of a packet radio network is equal to _
________
a) λτ
b) λ/τ
c) λ-τ
d) λτ2
Answer: a
Explanation: If λ is mean arrival rate and τ is the packet duration, then traffic occupancy or throughput of a packet ra
dio network is equal to λτ. The unit of R is in Erlangs.
a) Modulation technique
b) Multiple access technique
c) Random access technique
d) Spread spectrum technique
Answer: c
Explanation: The pure ALOHA protocol is a random access protocol used for data transfer. A user accesses a chann
el as soon as a message is ready to be transmitted.
9. For pure ALOHA protocol, the vulnerable period is ___________ the packet duration.
a) Double
b) Equal
c) Ten times
d) Not equal
Answer: a
Explanation: For the pure ALOHA protocol, the vulnerable period is double the packet duration. After a transmissio
n, the user waits for an acknowledgement on either the same channel or a separate feedback channel.
a) Two
b) Ten
c) One
d) Three
Answer: c
Explanation: The vulnerable period of slotted ALOHA is one packet duration. Since, partial collisions are prevented
through synchronization.
11. In slotted ALOHA, time is divided into different length of time slots.
a) True
b) False
Answer: b
Explanation: In slotted ALOHA, time is divided into equal time slots of length greater than the packet duration. The
subscribers each have synchronized clocks and transmit a message only at the beginning of a new time slot.
13. __________ is the time required for a terminal to sense whether or not the channel is idle.
a) Propagation delay
b) Average delay
c) Detection delay
d) Time delay
Answer: c
Explanation: In CSMA protocols, detection delay and propagation delay are two important parameters. Detection de
lay is a function of the receiver hardware and is the time required for a terminal to sense whether or not the channel i
s idle.
a) Slotted ALOHA
b) Pure ALOHA
c) CSMA
d) Reservation ALOHA
Answer: d
Explanation: Reservation ALOHA is a packet access scheme based on time division multiplexing. In this protocol, c
ertain packet slots are assigned with priority, and it is possible for users to reserve slots for the transmission of packe
ts.
1. ____________ is the maximum number of channels that can be provided in a fixed frequency band.
a) Channel capacity
b) Radio capacity
c) Spectral capacity
d) Carrier capacity
Answer: a
Explanation: Channel capacity for a radio system can be defined as the maximum number of channels or users that c
an be provided in a fixed frequency band. It is useful in computer science, in electrical engineering, and in other disc
iplines evaluating the capacity of a channel or conduit.
a) Channel capacity
b) Radio capacity
c) Spectral capacity
d) Carrier capacity
Answer: b
Explanation: Radio capacity is a parameter which measures spectrum efficiency of a wireless system. This paramete
r is determined by the required carrier to interference ratio and the channel bandwidth.
3. If D is the distance between co-channel cells and R be the cell radius, co-channel reuse ratio is given by ________
__
a) D*R
b) D2/R
c) D/R
d) D/R2
Answer: c
Explanation: Let, D is the distance between co-channel cells and R be the cell radius. Then the minimum ratio of D/
R that is required to provide a tolerable level of co-channel interference is called the co-channel reuse ratio.
4. __________ is the interference at a base station receiver that comes from the subscriber units in the surrounding c
ells.
5. In practice, TDMA systems improve capacity by ____________ compared to analog cellular systems.
a) TDMA
b) MAHO
c) FDMA
d) ACA
Answer: b
Explanation: Mobile assisted handoff (MAHO) allows subscribers to monitor the neighbouring base stations, and th
e best base station choice may be made by each subscriber. MAHO allows deployment of densely packed microcells
, thus giving substantial capacity gains in a system.
7. Time division multiple access introduces ACA, which stands for ________
8. Which of the following standard had not adopted digital TDMA for high capacity?
a) USDC
b) GSM
c) PDC
d) IS-95
Answer: d
Explanation: Various proposed standards such as the GSM, US digital cellular (USDC), and Pacific Digital Cellular
(PD
c) have adopted digital TDMA for high capacity. IS-95 does not use TDMA.
a) True
b) False
Answer: b
Explanation: The capacity of CDMA systems is interference limited. It is bandwidth limited in FDMA and TDMA.
Therefore, any reduction in the interference will cause a linear increase in the capacity of CDMA.
10. In a CDMA system, link performance for each user __________ as the number of users _______
a) Increase, decrease
b) Increase, increase
c) Decrease, increase
d) Decrease, decrease
Answer: a
Explanation: In a CDMA system, the link performance for each user increases as the number of users decreases. A st
raightforward way to reduce interference is to use multisectorized antennas, which results in spatial isolation of user
s.
11. Capacity of CDMA can be increased by operating in DTX, which stands for _______
a) One
b) Two
c) Zero
d) Ten
Answer: a
Explanation: The amount of out-of-cell interference determines the frequency reuse factor, f, of a CDMA cellular sy
stem. Ideally, each cell shares the same frequency and the maximum possible value of f (f=1) is achieved.
a) PSTN
b) MSC
c) CO
d) PBX
Answer: b
Explanation: To provide wireless communication within a particular geographic region, an integrated network of bas
e stations must be deployed to provide sufficient radio coverage to all mobile users. The base station, in turn must be
connected to a central hub called MSC (mobile switching center).
a) True
b) False
Answer: a
Explanation: The MSC provide connectivity between the public switched telephone network (PSTN) and the numer
ous base stations. It ultimately provides connectivity between all of the wireless subscribers in the system.
4. Communication protocol, CAI stands for ___________
5. At the base station, the air interface portion of mobile transmission is passed to MSC.
a) True
b) False
Answer: b
Explanation: At the base station, the air interface portion (i.e., signalling and synchronization dat
a) of the mobile transmission is discarded, and the remaining voice traffic is paased along to the MSC on fixed netw
orks.
a) LATA
b) LEC
c) PSTN
d) IXC
Answer: d
Explanation: A long distance telephone company collects toll fees to provide connections between different LATAs
over its long distance network. These companies are referred to as interexchange carriers (IXCs).
10. Wireless networks are extremely hostile and random nature of radio channel.
a) True
b) False
Answer: a
Explanation: A problem unique to wireless networks is the extremely hostile and random nature of the radio channel
, and since users may request service from any physical location while traveling over a wide range of velocities.
11. The technique for separate but parallel signalling channel is called ________
12. In North America, the cellular telephone signalling network uses _______
a) SS7
b) IXC
c) IS-41
d) PSTN
Answer: a
Explanation: In North America, the cellular telephone signalling network uses No. 7 Signalling System (SS7), and e
ach MSC uses the IS-41 protocol to communicate with other MSCs on the continent.
1. First generation cellular and cordless telephone networks are based on _________
a) Analog technology
b) Digital technology
c) Active technology
d) Passive technology
Answer: a
Explanation: First generation cellular and cordless telephone networks are based on analog technology. All first gen
eration cellular systems use FM modulation, and cordless telephones use a single base station to communicate with a
single portable terminal.
a) Efficient
b) Digital technology
c) High data rate
d) Low rate
Answer: d
Explanation: First generation wireless systems provide analog speech and inefficient, low rate, data transmission bet
ween the base station and mobile user.
3. Which of the following network protocol is used by US cellular carriers to automatically accommodate subscriber
s who roam into their coverage regions?
a) IS-36
b) IS-121
c) IS-41
d) IS-14
Answer: c
Explanation: US cellular carriers implemented the network protocol standard IS-41 to allow different cellular system
s to automatically accommodate subscribers who roam into their coverage region.
a) True
b) False
Answer: b
Explanation: IS-41 relies on a feature of AMPS called autonomous registration. Autonomous registration is a proces
s by which a mobile notifies a serving MSC of its presence and location.
a) True
b) False
Answer: a
Explanation: The MSC is able to distinguish home users from roaming users based on the MIN of each active user, a
nd maintains a real time user list in the home location register (HLR) and visitor location register (VLR).
6. The visited system creates a __________ record for each roamer and notifies home system to update __________
a) HLR, VLR
b) VLR, MIN
c) MIN, ESN
d) VLR, HLR
Answer: d
Explanation: The visited system creates a VLR record for each new roamer and notifies the home system via IS-41 s
o it can update its own HLR. IS-41 allows the MSCs of neighboring systems to automatically handle the registration
and location validation of roamers so that users no longer need to manually register as they travel.
a) GSM
b) CT2
c) AMPS
d) PACS
Answer: c
Explanation: AMPS is an example of first generation wireless networks. Second generation wireless systems emplo
y digital modulation and advanced call processing capabilities. Example includes GSM, CT2, PACS and DECT.
9. __________ is an example of second generation cordless telephone standard which allows each cordless phone to
communicate with any number of base stations.
a) PACS
b) CT2
c) GSM
d) DECT
Answer: d
Explanation: DECT is an example of second generation cordless telephone standard which allows each cordless pho
ne to communicate with any number of base stations. In DECT, the base stations have greater control in terms of swi
tching, signalling, and controlling handoffs.
a) GSM
b) ISDN
c) IMTS-2000
d) DECT
Answer: c
Explanation: FPLMTS (Future Public Land Mobile Telecommunication Systems) is more recently been called Inter
national Mobile Telecommunication (IMT-2000). It implies emerging third generation wireless systems for hand hel
d devices.
a) True
b) False
Answer: a
Explanation: The type of traffic carried by a network determines the routing services. It also determines protocols, a
nd call handling techniques which must be employed.
2. Connection oriented services are also called __________
a) Datagram services
b) Virtual circuit routing
c) Connectionless services
d) Routing service
Answer: b
Explanation: Connection oriented services are also called virtual circuit routing. In connection oriented routing, the c
ommunications path between the message source and destination is fixed for the entire duration of the message.
a) Datagram services
b) Virtual circuit routing
c) Connection oriented services
d) Routing service
Answer: a
Explanation: Connectionless services are also called datagram services. In a connectionless service, a call set up pro
cedure is not required at the beginning of a call, and each message burst is treated independently by the network.
4. First generation cellular systems provide connectionless services for each voice user.
a) True
b) False
Answer: b
Explanation: First generation cellular systems provide connection oriented services for each voice user. Voice chann
els are dedicated for users at the serving base station.
a) Datagram services
b) Circuit switching
c) Connectionless services
d) Routing service
Answer: b
Explanation: Wireless data networks are not supported by circuit switching. It is due to their short, bursty transmissi
ons which are often followed by periods of inactivity. Circuit switching is best suited for dedicated voice only traffic
.
a) True
b) False
Answer: a
Explanation: Packet switching breaks each message into smaller units for transmission and recovery. When a messa
ge is broken into packets, a certain amount of control information is added to each packet to provide source and desti
nation identification, as well as error recovery provisions.
a) Ending
b) Middle part
c) Beginning
d) Data information
Answer: c
Explanation: The header specifies the beginning of a new packet. It contains the source address, packet sequence nu
mber, and other routing and billing information.
a) CRC
b) User data
c) Address
d) ARQ
Answer: d
Explanation: The control field defines functions such as transfer of acknowledgments, automatic repeat requests (A
RQs), and packet sequencing. The information field contains user data. And the final field is the frame check sequen
ce field or the CRC (cyclic redundancy check).
a) True
b) False
Answer: b
Explanation: In contrast to circuit switching, packet switching provides excellent channel efficiency for bursty data t
ransmission of short length. An advantage of packet switched data is that the channel is utilized only when sending o
r receiving bursts of information.
10. __________ was developed by CCITT to provide standard connectionless network access protocols for three lay
ers of OSI model.
a) Packet switching
b) Datagram routing
c) X.25
d) CDPD
Answer: c
Explanation: X.25 was developed by CCITT (now ITU-T) to provide standard connectionless network access (packe
t switching) protocols for the three layers (layer 1, 2 and 3) of the open systems interconnection (OSI) model.
a) True
b) False
Answer: b
Explanation: The X.25 protocol does not specify particular data rates or how packet switched networks are impleme
nted. Rather, X.25 provides a series of standard functions and formats which give structure to the design of the softw
are.
a) True
b) False
Answer: b
Explanation: CDPD is a data service for first and second generation US cellular systems and uses a full 30 kHz AM
PS channel on a shared basis. CDPD provides mobile packet data connectivity to existing data networks.
a) Expensive to install
b) Uses different infrastructure
c) Complex
d) Inexpensive to install
Answer: d
Explanation: CDPD directly overlays with existing cellular infrastructure and uses existing base station equipment,
making it simple and inexpensive to install. CDPD does not use the MSC, but rather has its own traffic routing capa
bilities.
a) Simplex
b) Complex
c) Duplex
d) Expensive
Answer: c
Explanation: Each CDPD channel is duplex in nature. The forward channel serves as a beacon and transmits data fro
m the PSTN side of the network, while the reverse channel links all mobile users to the CDPD network and serves a
s the access channel for each subscriber.
a) Fixed length
b) Variable length
c) Long
d) Short
Answer: a
Explanation: CDPD transmissions are carried out using fixed length blocks. User data is protected using a Reed-Sol
omon (63, 47) block code with 6 bit symbols.
6. MDLP is _________
a) True
b) False
Answer: b
Explanation: ARDIS (Advanced Radio Data Information Systems) is a private network service provided by Motorol
a and IBM. It is based on MDC 4800 and RD-LAP protocols developed at Motorola.
10. The MSC provides subscriber access to the PSTN via the _______
11. ________ controls the switching of messages between nodes in the CCS network.
a) SS7
b) CCS
c) ARDIS
d) CDPD
Answer: b
Explanation: ISDN is a complete network framework designed around the concept of common channel signalling.
While telephone users throughout the world rely on the PSTN to carry conventional voice traffic, new end-user data
and signalling services can be provided with a parallel, dedicated signalling network.
3. Signalling component that supports traffic between the end-user and network is called ________
a) Network signalling
b) Digital subscriber signalling
c) Access signalling
d) Subscriber system signalling
Answer: c
Explanation: Access signalling supports traffic between the end user and the network. It defines how end users obtai
n access to the PSTN and the ISDN for communication or services.
a) True
b) False
Answer: b
Explanation: The second signalling component of ISDN, network signalling is governed by the SS7 suite of protocol
s. For wireless communication systems, the SS7 protocols within ISDN are critical to providing backbone network c
onnectivity between MSCs throughout the world.
a) D channels
b) Data channels
c) B channels
d) Voice channels
Answer: c
Explanation: The ISDN interface is divided into three different types of channels. Information bearing channels calle
d bearer channels (B channels) are used exclusively for end user traffic (voice, data and video).
6. ISDN provides integrated end user access to only packet switched networks.
a) True
b) False
Answer: b
Explanation: ISDN provides integrated end-user access to both circuit switched and packet switched networks with
digital end-to-end connectivity.
a) True
b) False
Answer: b
Explanation: ISDN end users may select between two different interfaces. The BRI (basic rate interface) is intended
to serve small capacity terminals while the PRI (primary rate interface) is intended for large capacity terminals.
a) SS7
b) CCS
c) ARDIS
d) B-ISDN
Answer: d
Explanation: Emerging networking technique, broadband ISDN (B-ISDN) is based on asynchronous transfer mode (
ATM) technology. It allows packet switching rates up to 2.4 Gbps and total switching capacities as high as 100 Gbp
s.
a) Circuit switched
b) Multiple access technique
c) Multiplexing technique
d) Handle only voice users
Answer: c
Explanation: ATM is a packet switching and multiplexing technique which has been specifically designed to handle
both voice users and packet data users in a single physical channel.
a) True
b) False
Answer: b
Explanation: ATM supports bidirectional transfer of data packets of fixed length between two end points. It preserve
s the order of transmission.
a) Cell
b) Atom
c) Molecule
d) Packet
Answer: a
Explanation: The data unit of ATM is cell. They are routed based on header information in each unit (called a label)
that identifies the cell as belonging to a specific ATM virtual connection.
a) 48 bytes
b) 47 bytes
c) 5 bytes
d) 53 bytes
Answer: d
Explanation: ATM cells have a fixed length of 53 bytes. It consists of 48 bytes of data and 5 bytes of header informa
tion. Fixed length packets result in simple implementation of fast packet switches.
a) Touchstar
b) 800 services
c) Alternate billing services
d) 400 services
Answer: d
Explanation: There are three main types of services offered by the SS7 network. They are the Touchstar, 800 service
s, and alternate billing services.
a) Touchstar
b) 800 services
c) Alternate billing services
d) 400 services
Answer: a
Explanation: Touchstar is also known as CLASS. It is a group of switch controlled services that provide its users wit
h certain call management capabilities.
3. Which of the following service of SS& provides call return, call forwarding?
a) Touchstar
b) 800 services
c) Alternate billing services
d) 400 services
Answer: a
Explanation: Touchstar is one of the three main type of services offered by SS7. It provides services such as call retu
rn, call forwarding, repeat dialling, call block, call tracing and caller ID.
a) True
b) False
Answer: a
Explanation: Alternate billing service and line information database use the CCS network to enable the calling party
to bill a call to a personal number (third party number, calling card, or collect etc.) from any number.
a) ITU
b) Ericsson
c) CCITT
d) Motorola
Answer: c
Explanation: SS7 is an outgrowth of the out of band signalling first developed by the CCITT under common channel
signalling standard, CCS no. 6.
a) All layers
b) Upper three
c) Lowest three
d) Middle two
Answer: c
Explanation: The lowest three layers of the OSI model are handled in SS7 by the network service part (NSP) of the
protocol. NSP is made up of three message transfer parts (MTPs) and the signalling connection control part (SCCP)
of the SS7 protocol.
a) MTP
b) CCS
c) ARDIS
d) CDPD
Answer: a
Explanation: The function of the MTP is to ensure that signalling traffic can be transferred and delivered reliably bet
ween the end users and the network. MTP is provided at three levels.
a) MTP level 1
b) MTP level 2
c) MTP level 3
d) TCAP
Answer: a
Explanation: Signalling data link functions (MTP level 1) provide an interface to the actual physical channel over w
hich communication takes place. Physical channels may include copper wire, twisted pair, fibre, mobile radio and ar
e transparent to the higher layers.
a) MTP level 1
b) MTP level 2
c) MTP level 3
d) TCAP
Answer: b
Explanation: Signalling data link functions are provided by MTP level 2. They correspond to the second layer in the
OSI reference model and provide a reliable link for the transfer of traffic between two directly connected signalling
points.
10. _________ provide procedures that transfer messages between signalling nodes.
a) MTP level 1
b) MTP level 2
c) MTP level 3
d) TCAP
Answer: c
Explanation: Signalling network functions (MTP level 3) provide procedures that ransfer messages between signalli
ng nodes. As in ISDN, there are two types of MTP level 3 functions: signalling message handling and signalling net
work management.
11. Which of the following does not include in SS7 user part?
a) MTP
b) ISUP
c) TCAP
d) OMAP
Answer: a
Explanation: The SS7 user part includes the ISDN user part (ISUP), the transaction capabilities application part (TC
AP) and operations maintenance and administration part (OMAP). The telephone user part (TUP) and the data user
part (DUP) are included in the ISUP.
a) Physical
b) Network
c) Data Link
d) Application
Answer: d
Explanation: The transaction capabilities application part in SS7 refers to the application layer which invokes the ser
vices of the SCCP and the MTP in a hierarchical format. TCAP is concerned with remote operations.
a) True
b) False
Answer: b
Explanation: The objective of personal communication systems (PCS) or personal communication networks (PCNs)
is to provide ubiquitous wireless communications coverage, enabling users to access telephone network and Internet.
3. AIN has different telephone numbers for both wireline and wireless services.
a) True
b) False
Answer: b
Explanation: AIN (advanced intelligent network) allow its users to have a single telephone number to be used for bo
th wireless and wireline services.
4. Circuit switching has more advantage than packet switching for PCS.
a) True
b) False
Answer: b
Explanation: Packet switching technology will have more advantages for PCS/PCN than circuit switching. PCS is re
quired to serve a wide range of services including voice, data, e-mail and digital video.
6. Which of the following has the function to accept information from PSTN?
a) TIU
b) WIU
c) BIU
d) CIU
Answer: a
Explanation: The function of TIU (Trunk interface unit) is to accept information from the PSTN. TIU acts as the phy
sical layer and transforms the standard format of the PSTN into the wireless access physical layer.
a) TIU
b) WIU
c) BIU
d) CIU
Answer: a
Explanation: PTI (Permanent terminal identifier) is the address of TIU. It is the address from where he call is origina
ted.
a) PTI
b) VCI
c) PRMA
d) CDPD
Answer: b
Explanation: VCI (virtual circuit identifier) is the information contained in the packet header of TIU. It is used to ide
ntify the route through which the transmission will take place.
a) Motorola
b) Ericsson
c) AT & T Bell Laboratories
d) ETSI
Answer: c
Explanation: In the late 1970s, AT & T Bell Laboratories developed the first US cellular telephone system called the
Advanced Mobile Phone System (AMPS). In 1983, a total of 40 MHz of spectrum in the 800 MHz band was locate
d by the Federal Communication Commission for AMPS.
a) One
b) Five
c) Three
d) Seven
Answer: d
Explanation: The AMPS system uses a seven cell reuse pattern. It also provides sectoring and cell splitting to increas
e capacity when needed.
a) ETACS
b) GSM
c) CDMA
d) IS-54
Answer: a
Explanation: ETACS is virtually identical to AMPS. It was developed in middle 1980s and stands for European Tota
l Access Communication System.
5. AMPS and ETACS use ___________ and _____ for radio transmission.
a) FM, TDD
b) FM, FDD
c) AM, TDD
d) FM, FDD
Answer: b
Explanation: Like all other first generation, analog, cellular systems, AMPS and ETACS use frequency modulation (
FM) and frequency division duplex (FD
d) for radio transmission.
6. US AMPS system provides 42 control channel for each of the two service providers.
a) True
b) False
Answer: b
Explanation: In the US AMPS system, there are twenty one control channels for each of the two service providers in
each market. However, ETACS supports forty two control channels for a single provider.
7. In each cellular market, the non wireline service provider is assigned an odd SID.
a) True
b) False
Answer: a
Explanation: In each cellular market, the non wireline service provider (the ‘A’ provider) is assigned an odd SID (sy
stem identification number). The wireline provider (the ‘B’ provider) is assigned an even SID.
9. _________ allows base and mobile to distinguish each other from co-channel users located in different cells.
a) SAT
b) VMAC
c) MAC
d) FVC
Answer: a
Explanation: The SAT (supervisory audio tone) has one of the three different frequencies which allow the base and
mobile to distinguish each other from co channel users located in different cells.
10. AMPS and ETACS use same physical channels for transmission of voice and control channels.
a) True
b) False
Answer: b
Explanation: AMPS and ETACS use different physical rate channels for transmission of voice and control channels.
A control channel is used by each base station in the system to simultaneously page subscriber units to alert them of
incoming calls.
a) P-AMPS
b) N-AMPS
c) H-APMS
d) R-AMPS
Answer: b
Explanation: To increase capacity in large AMPS markets, Motorola developed an AMPS like system called N-AM
PS (narrowband AMPS) in 1991. N-AMPS did not become widespread as 2G digital technologies displaced many o
f the original FM analog systems.
a) IS-54
b) IS-136
c) PSTN
d) GSM
Answer: a
Explanation: The dual mode USDC/AMPS system was standardized as Interim Standard 54 (IS 54). It was standardi
zed by Electron Industries Association and Telecommunication Industry Association (EIA/TI
a) in 1990. It was later upgraded to IS-136.
a) SADC
b) NADC
c) PADC
d) N-AMPS
Answer: b
Explanation: USDC is also known as North American Digital Cellular (NADC). It has been installed in North Ameri
ca in the countries like Canada and Mexico.
a) True
b) False
Answer: b
Explanation: The USDC system was designed to share the same frequencies, frequency reuse plan, and base stations
as AMPS, so that base stations and subscriber units could be equipped with both AMPS and USDC channels within
the same piece of equipment.
a) SADC
b) PADC
c) D-AMPS
d) K-AMPS
Answer: c
Explanation: USDC (United States Digital Cellular System) maintains compatibility with AMPS in a number of way
s. Therefore, USDC is also known as D-AMPS (digital AMPS).
5. USDC forward and reverse control channels use exactly the same signalling techniques as AMPS.
a) True
b) False
Answer: a
Explanation: To maintain compatibility with AMPS phones, USDC forward and reverse control channels use exactl
y the same signalling techniques as AMPS. USDC voice channels use 4-ary π/4 DQPSK modulation with a channel
rate of 48.6 kbps.
a) Same
b) Three times
c) Twice
d) Four times
Answer: c
Explanation: USDC has twice as many control channels as AMPS. In addition to the forty two primary AMPS contr
ol channels, USDC specifies forty two additional control channels called the secondary control channels.
7. Which of the following data channels of USDC carries the user information?
a) DTC
b) CVDCC
c) SACCH
d) FACCH
Answer: a
Explanation: DTC (data traffic channel) is the most important data channel as far as the end user is concerned. It carr
ies user information (i.e. speech or user data).
8. Which of the following channel is similar in functionality to the SAT used in AMPS?
a) DTC
b) CDVCC
c) SACCH
d) FACCH
Answer: b
Explanation: CDVCC (Code Digital Verification Color Code) is a 12 bit message sent in every time slot and is simil
ar in functionality to the SAT used in AMPS. The CDVCC is an 8 bit number ranging between 1 and 255, which is
protected with four additional channel coding bits from a shortened Hamming code.
a) DTC
b) CVDCC
c) SACCH
d) FACCH
Answer: c
Explanation: The SACCH (slow associated control channel) is sent in every time slot and provides a signalling chan
nel in parallel with the digital speech. The SACCH carries various control and supervisory messages between the su
bscriber unit and the base station.
10. Which of the following channel in USDC is used to send important control or specialized traffic data between th
e base station and mobile units?
a) DTC
b) CVDCC
c) SACCH
d) FACCH
Answer: d
Explanation: FACCH (fast associated control channel) is used to send important control or specialized traffic data be
tween the base station and mobile units. The FACCH data, when transmitted, takes the place of user information dat
a within a frame.
1. Which of the following is the world’s first cellular system to specify digital modulation and network level architec
ture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
Answer: a
Explanation: GSM was the world’s first cellular system to specify digital modulation and level architectures and ser
vices. It is the world’s most popular 2G technology. It was developed to solve the fragmentation problems of the firs
t cellular systems in Europe.
a) ITU
b) AT & T
c) ETSI
d) USDC
Answer: c
Explanation: The setting of standards for GSM is under the aegis of the European Technical Standards Institute (ET
SI). GSM task was to specify a common mobile communication system for Europe in the 900 MHZ band.
4. Which of the following does not come under the teleservices of GSM?
a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony
Answer: c
Explanation: Supplementary ISDN services are digital in nature. They include call diversion, closed user groups, an
d caller identification, and are not available in analog mobile networks. Supplementary services also include short m
essaging service (SMS).
6. Which of the following memory device stores information such as subscriber’s identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
Answer: c
Explanation: SIM (subscriber identity module) is a memory device that stores information such as the subscriber’s i
dentification number, the networks and countries where the subscriber is entitled to service, privacy keys, and other
user specific information.
7. Which of the following feature makes impossible to eavesdrop on GSM radio transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
Answer: b
Explanation: The on the air privacy feature of GSM makes impossible to eavesdrop on a GSM radio transmission. T
he privacy is made possible by encrypting the digital bit stream sent by a GSM transmitter, according to a specific se
cret cryptographic key that is known only to the cellular carrier.
8. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
Answer: d
Explanation: The GSM architecture consists of three major interconnected subsystems that interact between themsel
ves and with the users through certain network interfaces. The subsystems are BSS (Base Station Subsystem), NSS (
Network and Switching Subsystem) and OSS (Operation Support Subsystem).
9. Which of the following subsystem provides radio transmission between mobile station and MSC?
a) BSS
b) NSS
c) OSS
d) BSC
Answer: a
Explanation: The BSS provides and manages radio transmission paths between the mobile stations and the Mobile S
witching Center (MSC). It also manages the radio interface between the mobile stations and all other subsystems of
GSM.
a) BSS
b) NSS
c) OSS
d) MSC
Answer: b
Explanation: NSS (Network and Switching Subsystem) manages the switching functions of the system. It allows the
MSCs to communicate with other networks such as PSTN and ISDN.
a) BSS
b) NSS
c) OSS
d) MSC
Answer: c
Explanation: The OSS (Operation Support Subsystem) supports the operation and maintenance of GSM. It allows sy
stem engineers to monitor, diagnose, and troubleshoot all aspects of GSM.
a) Traffic channels
b) Control channels
c) Signalling channels
d) Forward channels
Answer: a
Explanation: Traffic channels carry digitally encoded user speech or user data. It has identical functions and formats
on both the forward and reverse links.
a) Traffic channels
b) Control channels
c) Signalling channels
d) Forward channels
Answer: b
Explanation: Control channels carry signalling and synchronizing commands between the base station and mobile st
ation. Certain types of control channels are defined for just the forward or reverse link.
a) BCH
b) CCCH
c) DCCH
d) TCH
Answer: d
Explanation: There are three main control channels in the GSM system. These are the broadcast channel (BCH), the
common control channel (CCCH) and the dedicated control channel (DCCH). Each control channel consists of sever
al logical channels.
4. Which of the following is the forward control channel that is used to broadcast information?
a) BCCH
b) CCCH
c) DCCH
d) TCH
Answer: a
Explanation: The broadcast control channel (BCCH) is a forward channel that is used to broadcast information such
as cell and network identity, and operating characteristics of the cell.
a) PCH
b) RACH
c) DCCH
d) AGCH
Answer: c
Explanation: CCCH consists of three different channels. They are paging channel (PCH), which is a forward link ch
annel, the random access channel (RACH) which is a reverse link channel, and the access grant channel (AGCH) wh
ich is a forward link channel.
6. Which of the following channel provides paging signals from base station to all mobiles in the cell?
a) RACH
b) AGCH
c) DCCH
d) PCH
Answer: d
Explanation: The PCH provides paging signals from the base station to all mobiles in the cell. It notifies a specific m
obile of an incoming call which originates from the PSTN.
a) RACH
b) AGCH
c) DCCH
d) PCH
Answer: a
Explanation: The RACH (Random Access Channel) is a reverse link channel used by a subscriber unit to acknowled
ge a page from the PCH. It is also used by mobiles to originate a call.
8. Which of the following channel is used by base station to provide forward link communication to mobile?
a) RACH
b) AGCH
c) DCCH
d) PCH
Answer: b
Explanation: The AGCH (Access Grant Channel) is used by the base station to provide forward link communication
to the mobile. It carries data which instructs the mobile to operate in a particular physical channel with particular de
dicated control channel.
9. Which of the following burst is used to broadcast the frequency and time synchronization control messages?
10. Which of the following burst is used to access service from any base station?
a) TCH
b) RACH
c) SCH
d) FCCH
Answer: b
Explanation: Each user transmits a burst of data during the time slot assigned to it. The RACH burst is used by all m
obiles to access service from any base station, and dummy burst is used as filter information for unused timeslots on
forward link.
a) True
b) False
Answer: b
Explanation: Each of the normal speech frames are grouped into larger structures called multiframes. These multifra
mes are grouped into superframes and hyperframes.
a) IS-54
b) IS-136
c) IS-95
d) IS-76
Answer: c
Explanation: A US digital cellular system based on CDMA was standardized as Interim Standard 95 (IS-95). It was
standardized by US Telecommunication Industry Association (TI
a) and promised increased capacity.
a) True
b) False
Answer: b
Explanation: Like IS-136, IS-95 system was designed to be compatible with the existing US analog cellular system (
AMPS) frequency band. Hence, mobile and base stations can be economically produced for dual mode operation.
a) DSSS
b) FHSS
c) THSS
d) Hybrid
Answer: a
Explanation: IS-95 uses a direct sequence spread spectrum CDMA system. It allows each user within a cell to use th
e same radio channel, and users in adjacent cell also use the same radio channel.
4. Each IS-95 channel occupies ___________ of spectrum on each one way link.
a) 1.25 MHz
b) 1.25 kHz
c) 200 kHz
d) 125 kHz
Answer: a
Explanation: To facilitate graceful transition from AMPS to CDMA, each IS-95 channel occupies 1.25 MHz of spec
trum on each one way link, or 10% of the available cellular spectrum for a US cellular provider.
5. IS-95 uses same modulation technique for forward and reverse channel.
a) True
b) False
Answer: b
Explanation: IS-95 uses different modulation and spreading technique for the forward and reverse links. On the forw
ard link, the base station simultaneously transmits the user data for all mobiles in the cell by using different spreadin
g sequence for each mobile.
a) 869-894 MHz
b) 849-894 MHz
c) 849-869 MHz
d) 824-849 MHz
Answer: d
Explanation: IS-95 is specified for reverse link operation in the 824-849 MHz band and 869-894 MHz for the forwar
d link. The PCS version of IS-95 has also been designed for international use in the 1800-2000 MHz bands.
a) Equalizer
b) Registers
c) RAKE receiver
d) Frequency divider
Answer: c
Explanation: At both the base station and the subscriber, RAKE receivers are used to resolve and combine multipath
components, thereby reducing the degree of fading. A RAKE receiver exploits the multipath time delays in a chann
el and combines the delayed replicas of transmitted signal.
a) True
b) False
Answer: b
Explanation: CT2 was the second generation of cordless telephones introduced in Great Britain in 1989. It is used to
provide telepoint services which allow a subscriber to use CT2 handsets at a public telepoint.
a) True
b) False
Answer: b
Explanation: CT2 is a digital version of the first generation, analog, cordless telephones. When compared with analo
g cordless phones, CT2 offers good speech quality and is more resistant to interference.
a) True
b) False
Answer: a
Explanation: The main function of DECT is to provide local mobility to portable users in an in-building Private Bra
nch Exchange (PBX). It provides excellent quality and services for voice and data applications.
a) TCP
b) IP
c) OSI
d) AMPS
Answer: c
Explanation: The DECT system is based on OSI (Open System Interconnection) principles in a manner similar to IS
DN. A control plane (C-plane) and a user plane (U-plane) use the services provided by the lower layers.
5. Which of the following layer consists of paging channel and control channel?
a) Physical layer
b) Network layer
c) Data link layer
d) MAC layer
Answer: d
Explanation: The MAC (Medium Access Control) layer consists of a paging channel and a control channel for the tr
ansfer of signalling information to the C-plane. The U-plane is served with channels for the transfer of user informat
ion.
6. Which of the following layer is responsible for providing reliable data links?
a) Physical layer
b) Network layer
c) Data link control layer
d) MAC layer
Answer: c
Explanation: The DLC (data link control) layer is responsible for providing reliable data links to the network layer. I
t divides up the logical and physical channels into time slots for each user.
a) Physical layer
b) Network layer
c) Data link layer
d) MAC layer
Answer: b
Explanation: The network layer is the main signalling layer of DECT. It is based on GSM and ISDN (layer 3) protoc
ols. It provides call control and circuit switched services selected from one of the DLC services.
8. Which of the following supports the physical layer of DECT common air interface?
a) Portable Handset
b) Network specific Interface Unit
c) Radio Fixed Part
d) Cordless controller
Answer: c
Explanation: RFP (Radio Fixed Part) supports the physical layer of the DECT common air interface. Every RFP cov
ers one cell in the microcellular system. A full duplex operation is achieved using TDD.
a) Portable Handset
b) Network specific Interface Unit
c) Radio Fixed Part
d) Cordless controller
Answer: b
Explanation: Network specific Interface Unit supports the call completion facility in a multihandset environment. Th
e interface recommended by the CCITT is the G.732 based on ISDN protocols.
a) PACS
b) AMPS
c) IS-95
d) GSM
Answer: a
Explanation: PACS (Personal Access Communication Systems) is a third generation Personal Communication Syste
m. It was originally developed and proposed by Bellcore in 1992.
a) PACS
b) AMPS
c) PDC
d) GSM
Answer: c
Explanation: PDC (Pacific digital cellular) is also known as Japanese Digital Cellular. It was developed in 1991 to p
rovide for needed capacity in congested cellular bands in Japan.
a) UDP
b) HSP
c) ITC
d) L2CAP
Answer: d
Explanation: L2CAP is Logical Link, Control Adaptation Protocol Layer. The logical unit link control adaptation pr
otocol is equivalent to logical link control sub layer of LAN. The ACL link uses L2CAP for data exchange. The vari
ous function of L2CAP is segmentation and reassembly, multiplexing and quality of service.
2. Protocols are set of rules to govern _________
a) Communication
b) Standard
c) Metropolitan communication
d) Bandwidth
Answer: a
Explanation: A protocol is a set of rules that governs the communications between computers on a network. These r
ules include guidelines that regulate the characteristics of a network including access method, allowed physical topol
ogies, types of cabling, and speed of data transfer.
3. An internet is a __________
a) Collection of WANS
b) Network of networks
c) Collection of LANS
d) Collection of identical LANS and WANS
Answer: b
Explanation: Internet is a massive network of networks, a networking infrastructure. It connects millions of compute
rs together globally, forming a network in which any computer can communicate with any other computer as long as
they are both connected to the Internet.
a) Session layer
b) Transport layer
c) Network layer
d) Data link layer
Answer: d
Explanation: The checksum is used in the Internet by several protocols although not at the data link layer. Like linea
r and cyclic codes, the checksum is based on the concept of redundancy. Several protocols still use the checksum for
error detection.
5. In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is __________
a) Discarded
b) Accepted
c) Interpreted
d) Interpreted incorrectly
Answer: a
Explanation: A 4 bit field defines the version of IPv4 protocol. This field tells the software running in the processing
machine that the datagram has the format of version 4. If the machine is using some other version of IPv4, the datag
ram is discarded rather than interpreted incorrectly.
6. Network layer at source is responsible for creating a packet from data coming from another ________
a) Station
b) Link
c) Node
d) Protocol
Answer: d
Explanation: ‘The network layer at the source is responsible for creating a packet from the data coming from another
’ protocol (such as a transport layer protocol or a routing protocol). The network layer is responsible for checking its
routing table to find the routing information.
7. Header of datagram in IPv4 has _________
a) 0 to 20 bytes
b) 20 to 40 bytes
c) 20 to 60 bytes
d) 20 to 80 bytes
Answer: c
Explanation: IP header length is a minimum of 20 bytes and a maximum of 60 bytes. The minimum value for this fie
ld is 5, which is a length of 5×32 = 160 bits = 20 bytes. Being a 4-bit value, the maximum length is 15 words (15×32
bits) or 480 bits = 60 bytes.
a) Fixed length
b) Variable length
c) Global length
d) Zero length
Answer: b
Explanation: ‘IPv4 is a connectionless protocol used for packet switched networks. It operates on best effort delivery
model, in which neither delivery is guaranteed, nor proper sequencing or avoidance of duplicate delivery is assured.
The size of the datagram header can be of variable length from 20 bytes to 60 bytes.’
9. In IPv4, service type of service in header field, first 3 bits are called ______
a) Type of service
b) Code bits
c) Sync bits
d) Precedence bits
Answer: d
Explanation: The 8-bit ToS (type of service) in IPv4 uses 3 bits for IP Precedence, 4 bits for ToS with the last bit not
being used. The 4-bit ToS field, although defined, has never been used.
a) ARP
b) TCP
c) UDP
d) HTTP
Answer: b
Explanation: ‘In computer networking, the link layer is the lowest layer in the Internet Protocol Suite. It is commonl
y known as TCP/IP, the networking architecture of the Internet. It is described in RFC 1122 and RFC 1123.’
11. Which protocol is commonly used to retrieve email from a mail server?
a) FTP
b) IMAP
c) HTML
d) TELNET
Answer: b
Explanation: ‘The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote
web server from a local client. IMAP is the most commonly used Internet mail protocols for retrieving emails. It is s
upported by all modern email clients and web servers.’
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
1. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?
a) Application
b) Host to host
c) Internet
d) Network Access
Answer: b
Explanation: The four layers of the TCP/IP stack (also called the DoD model) are Application/Process, Host-to-Host
, Internet, and Network Access. The Host-to-Host layer is equivalent to the Transport layer of the OSI model.
2. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, defa
ult gateway, and DNS information. Which protocol will you use to accomplish this?
a) SMTP
b) SNMP
c) DHCP
d) ARP
Answer: c
Explanation: Dynamic Host Configuration Protocol (DHCP) is used to provide IP information to hosts on your netw
ork. DHCP can provide a lot of information, but the most common is the IP address, subnet mask, default gateway, a
nd DNS information.
3. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the
Network layer of the OSI model?
a) Application
b) Host to Host
c) Internet
d) Network Access
Answer: c
Explanation: The four layers of the DoD model are Application/Process, Host-to-Host, Internet, and Network Acces
s. The Internet layer is equivalent to the Network layer of the OSI model.
a) FTP
b) SMTP
c) Telnet
d) DNS
Answer: d
Explanation: DNS and some other services work on both TCP and the UDP protocols. DNS uses TCP for zone exch
anges between servers and UDP when a client is trying to resolve a hostname to an IP address.
a) 4bit long
b) 16bit long
c) 32bit long
d) 8 bit long
Answer: b
Explanation: TCP and UDP port numbers are 16 bits in length. So, valid port numbers can theoretically take on valu
es from 0 to 65,535. These values are divided into ranges for different purposes, with certain ports reserved for parti
cular uses.
a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
Answer: b
Explanation: TCP/IP network model is a hierarchical protocol made up of interactive modules, each of which provid
es a specific functionality; however, the modules are not necessarily interdependent. It is equivalent to combined ses
sion, presentation and application layer.
a) One
b) Two
c) Three
d) Four
Answer: d
Explanation: Four levels of addresses are used in the internet employing the TCP/IP protocols. They are physical (li
nk) addresses, logical (IP) addresses, port addresses, and specific addresses.
a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
Answer: b
Explanation: In open systems, a virtual terminal (VT) is an application service. It allows host terminals on a multi-us
er network to interact with other hosts regardless of terminal type and characteristics.
a) ARPANET
b) OSI
c) DECNET
d) ALOHA
Answer: a
Explanation: In 1983, TCP/IP protocols replaced NCP (Network Control Program) as the ARPANET’s principal pro
tocol. And ARPANET then became one component of the early Internet. The starting point for host-to-host commun
ication on the ARPANET in 1969 was the 1822 protocol, which defined the transmission of messages to an IMP.
a) Router
b) Equalizer
c) Bridge
d) Repeater
Answer: a
Explanation: A router is a networking device that forwards data packets between computer networks. Routers perfor
m the traffic directing functions on the Internet. It supports different network layer transmission standards. Each net
work interface is used to enable data packets to be forwarded from one transmission system to another.
a) Router
b) Equalizer
c) Bridge
d) Repeater
Answer: d
Explanation: A repeater connects two segments of your network cable. It retimes and regenerates the signals to prop
er amplitudes and sends them to the other segments. Repeaters work only at the physical layer of the OSI network m
odel.
a) Transmittable slots
b) Packet
c) Segment
d) Source Slots
Answer: c
Explanation: Applications working at the Application Layer transfers a contiguous stream of bytes to the bottom lay
ers. It is the duty of TCP to pack this byte stream to packets, known as TCP segments, which are passed to the IP lay
er for transmission to the destination device.
a) Interconnection of network
b) LAN
c) MAN
d) WAN
Answer: c
Explanation: A MAN often acts as a high speed network to allow sharing of regional resources. It typically covers a
n area of between 5 and 50 km diameter. Examples of MAN are telephone company network that provides a high sp
eed DSL to customers and cable TV network.
a) 400 Km
b) 500 Km
c) 600 Km
d) 700 Km
Answer: c
Explanation: The stations on wireless ALOHA networks are a maximum of 600 km apart. It was designed for a radi
o (wireless) LAN, but it can be used on any shared medium. It is obvious that there are potential collisions in this arr
angement. The medium is shared between the stations.
4. IEEE 802.11 defines basic service set as building block of a wireless ___________
a) LAN
b) WAN protocol
c) MAN
d) ALOHA
Answer: a
Explanation: The IEEE 802.11 topology consists of components interacting to provide a wireless LAN. It enables st
ation mobility transparent to higher protocol layers, such as the LLC.
5. In wireless LAN, there are many hidden stations so that __________ cannot be detected.
a) Frames
b) Collision
c) Signal
d) Data
Answer: b
Explanation: In wireless networking, the hidden node problem or hidden terminal problem occurs when a node is vis
ible from a wireless access point (AP), but not from other nodes communicating with said AP. This leads to difficult
ies in media access control and collisions could not be detected.
6. A set that makes stationary or mobile wireless station and also have optional central base station is known as ____
_______
a) 1869
b) 1895
c) 1879
d) 1885
Answer: b
Explanation: In England, Guglielmo Marconi began his wireless experiments in 1895. On 2 June 1896, he filed his p
rovisional specification of a patent for wireless telegraphy. He demonstrated the system to the British Post Office in
July.
a) 3 broad groups
b) 6 broad groups
c) 9 broad groups
d) 8 broad groups
Answer: a
Explanation: We can divide wireless transmission into three broad groups: radio waves, microwaves, and infrared w
aves. Radio waves are used for multicast communications, such as AM and FM radio, television, maritime radio, cor
dless phones and paging systems. Microwave propagation is line-of-sight.
a) Four Layers
b) Five Layers
c) Six Layers
d) Seven Layers
Answer: a
Explanation: TCP/IP functionality is divided into four layers, each with its own set of agreed-upon protocols: The da
talink layer consists of methods and protocols that operate only on a link. The Internet layer connects independent ne
tworks to transport the packets. The Transport layer handles communications between. The Application layer standa
rdizes data exchange for applications.
a) Datagrams
b) Frames
c) Segments
d) Encapsulate message
Answer: a
Explanation: The format of data that can be recognized by IP is called an IP datagram. It consists of two components
, the header and data, which need to be transmitted. The fields in the datagram, except the data, have specific roles to
perform in the transmission of data.
11. Parameter that is normally achieved through a trailer added to end of frame is ___________
a) Access Control
b) Flow Control
c) Error Control
d) Physical addressing
Answer: c
Explanation: The data link layer adds reliability to the physical layer by adding mechanisms to detect and retransmit
damaged or lost frames. It also uses a mechanism to recognize duplicate frames. Error control is normally achieved t
hrough a trailer added to the end of the frame.
a) 216
b) 2128
c) 232
d) 28
Answer: b
Explanation: The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6 address is 128
bits, compared with 32 bits in IPv4. The address space therefore has 2128 or approximately 3.4×1038 addresses.
2. Three strategies used to handle transition from version 4 to version 6 are dual-stack, tunneling and ________
a) Header Switching
b) Header Translation
c) Header Transfer
d) Header Transmission
Answer: b
Explanation: Three strategies used to handle transition from version 4 to version 6 are dual-stack, tunneling and hea
der translation. Header translation techniques are more complicated than IPv4 NAT because the protocols have diffe
rent header formats.
3. MTU stands for _________
4. In IPv6, real-time audio or video, particularly in digital form, requires resources such as __________
a) Fixed Bandwidth
b) Variable Bandwidth
c) High Bandwidth
d) Low Bandwidth
Answer: c
Explanation: In IPv6, real-time audio or video, particularly in digital form, requires resources such as high bandwidt
h, large buffers, long processing times, and so on. A process can make a reservation for these resources beforehand t
o guarantee that real time data will not be delayed.
5. In practical IPv6 application, a technology encapsulates IPv6 packets inside IPv4 packets, this technology is calle
d _______
a) Tunneling
b) Hashing
c) Routing
d) NAT
Answer: a
Explanation: IPv6 tunneling enables IPv6 hosts and routers to connect with other IPv6 hosts and routers over the exi
sting IPv4 Internet. The main purpose of IPv6 tunneling is to deploy IPv6 as well as maintain compatibility with larg
e existing base of IPv4 hosts and routers.
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes. It results in faster processing of the datagram. Fixed
length IPv6 header allows the routers to process the IPv6 datagram packets more efficiently.
8. In the IPv6 header, the traffic class field is similar to which field in the IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
Answer: c
Explanation: This field enables to have different types of IP datagram. In an IPv6 packet, the Traffic Class byte is us
ed in the same way as the ToS byte in an IPv4 packet. A ToS/Traffic Class byte includes a DSCP (Differentiated Ser
vices Codepoint) and precedence bits.
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6. IPv6 no longer has a header checksum to protect
the IP header, meaning that when a packet header is corrupted by transmission errors, the packet is very likely to be
delivered incorrectly.
a) Protocol
b) Dataset
c) Headers
d) Routes
Answer: a
Explanation: IPv6 is designed to allow the extension of the protocol if required by new technologies or applications.
IPv6 uses a new header format in which options are separated from the base header and inserted, when needed, betw
een the base header and upper-layer data.
12. In an IPv6 datagram, M bit is 0, value of HLEN is 5, value of total length is 200 and offset value is __________
_
a) 400
b) 350
c) 300
d) 200
Answer: d
Explanation: In an IPv6 datagram, M bit is 0, value of HLEN is 5, the value of total length is 200 and offset value is
200. If the M bit is 0, it means there are no more fragments, the fragment is the last name.
********** Join:- https://t.me/AKTU_Notes_Books_Quantum **********
a) Circular polarization
b) Maneuverability
c) Beamwidth
d) Gain
Answer: a
Explanation: In helical antenna, the diameter and pitch of the helix are comparable to a wavelength. The antenna fun
ctions as a directional antenna radiating a beam off the ends of the helix. It radiates circularly polarized radio waves.
These are used for satellite communication.
a) Transceivers
b) Transponders
c) Transducers
d) TWT
Answer: b
Explanation: A communications satellite’s transponder is the series of interconnected units that form a communicati
ons channel between the receiving and the transmitting antennas. It is mainly used in satellite communication to tran
sfer the received signals.
a) Footprint
b) Spot
c) Earth
d) Region
Answer: a
Explanation: The geographical representation of a satellite’s antenna radiation pattern is called a footprint or footpri
nt map. In essence, a footprint of a satellite is the area on Earth’s surface that the satellite can receive from or transm
it to.
a) Zone beam
b) Hemispheric beam
c) Spot beam
d) Global beam
Answer: c
Explanation: The size of the antenna that generates these beams on earth is related directly to the peak gain at the ce
nter of the spot beams and the smallest spot beam size. The spot beams are typically defined by the contours at 3 or
4 dB down from the peak power at the center of the beam.
5. _________ detects the satellite signal relayed from the feed and converts it to an electric current, amplifies and lo
wers its frequency.
a) Horn antenna
b) LNA
c) Satellite receiver
d) Satellite dish
Answer: b
Explanation: LNA detects the satellite signal relayed from the feed and converts it to an electric current, amplifies an
d lower its frequency. The most common device used as an LNA is tunnel diode.
a) Uplink
b) Downlink
c) Terrestrial
d) Earthbound
Answer: b
Explanation: In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stati
ons or receivers, and an uplink is the link from a ground station up to a satellite.
a) Atmospheric loss
b) Path loss
c) Radiation loss
d) RFI
Answer: b
Explanation: The path loss is the loss in signal strength of a signal as it travels through free space. This value is usua
lly calculated by discounting any obstacles or reflections that might occur in its path.
8. Which of the following is the point on the satellite orbits closest to the Earth?
a) Apogee
b) Perigee
c) Prograde
d) Zenith
Answer: b
Explanation: The point where satellite is closest to the Earth is known as the perigee. Here, the satellite moves at its
fastest. The high point of the orbit, when the satellite is moving the slowest is called the apogee.
a) Lithium
b) Leclanche
c) Hydrogen
d) Magnesium
Answer: a
Explanation: Lithium batteries have more power and are lighter in weight. Any mass that could be saved by the use
of lighter batteries would allow a corresponding increase in the amount of useful payload equipment.
a) 6/4 GHz
b) 14/11 GHz
c) 12/14 GHz
d) 4/8 GHz
Answer: b
Explanation: The Ku band is a portion of the electromagnetic spectrum in the microwave range of frequencies rangi
ng from 11.7 to 12.7GHz. (downlink frequencies) and 14 to 14.5GHz (uplink frequencies).
a) Zener diode
b) Tunnel diode
c) IMPATT
d) Shockley diode
Answer: b
Explanation: The LNA must provide a relatively flat response for the frequency range of interest, preferably with les
s than 1 dB of gain variation. The most common device used as an LNA (low noise amplifier) is tunnel diode. It is a
highly sensitive, low-noise device.
a) Femtocell network
b) 3GPP
c) LTE
d) AMPS
Answer: a
Explanation: Femtocell Network is a small-size Macro cell network designed for better indoor coverage. It began att
racting attention from both industry and academy in late 2007.
2. Coverage of Femtocell Network is much larger than a regular Macro cell Network.
a) True
b) False
Answer: b
Explanation: The “femto” means 10-15. Coverage of Femtocell Network is much smaller than a regular Macro cell
Network that is why this name is given. Femtocell Network, installed by end users at home or in an office environm
ent.
a) Short range
b) Low power
c) High cost
d) Wireless handsets
Answer: c
Explanation: Femtocell Base Stations (F-BSs) are short-range, low-cost, low-power indoor devices to provide servic
e for wireless handsets. F-BS, which looks like WLAN Access Point (AP), is a small device with at least two wirele
ss and internet interfaces.
5. Any existing wireless telecommunication standard cannot be used at F-BS wireless interface.
a) True
b) False
Answer: b
Explanation: Wireless interface provides wireless radio access to Femtocell MSs. Any existing wireless telecommun
ication standard, such as UMTS/ CDMA200/ WIMAX/ LTE/ EV-DO, can be used at the F-BS wireless interfaces.
a) F-BS
b) Internet link
c) FGW
d) BSC
Answer: c
Explanation: Femtocell Gateway (FGW) is a service provider’s device that acts as a gateway between the Internet an
d the communication network. One side of FGW connects a large number of F-BSs via broadband Internet, and the
other side of FGW is connected to the telephony core network.
a) True
b) False
Answer: a
Explanation: Femtocell Network is a so-called “double-win” strategy that brings benefits to both cellular users and c
ellular providers. It provides improved seamless coverage and enhanced capacity for cellular users.
8. In _________ all cellular users belong to open subscribers group (OSG) and can access F-BS unconditionally.
9. In _______ a closed subscribers group (CSG) is set by F-BS owner to allow only small portion of cellular users to
be served in the Femtocell Network.
10. Femtocell Network has the capability to help Macro cell Network achieve seamless coverage.
a) True
b) False
Answer: a
Explanation: Femtocell Network has the capability to help Macro cell Network achieve seamless coverage. It can att
ain higher network capacity by transmitting over an Internet link.
a) True
b) False
Answer: b
Explanation: Unlike conventional radio systems, which operate within a relatively narrow bandwidth, the UWB radi
o system operates across a wide range of the frequency spectrum by transmitting a series of extremely narrow (10–1
000 per secon
d) and low-power pulses.
a) True
b) False
Answer: b
Explanation: The basic element in TM–UWB technology is the monocycle wavelet. Typically, wavelet pulse widths
are between 0.2 and 1.5 nanoseconds, corresponding to center frequencies between 600 MHz and 5 GHz.
4. In TM–UWB, the system uses a modulation technique called _______
6. The coherent interaction of signals in UWB arriving by many paths causes ____________
a) Ricean fading
b) Nakagami fading
c) Rayleigh fading
d) Multicast fading
Answer: c
Explanation: The coherent interaction of signals arriving by many paths causes the Rayleigh or multipath fading in
RF communications. Inside buildings, when continuous sine waves are transmitted wherein the channels exhibit mul
tipath differential delays in the nanosecond range, the multipath fading occurs naturally.
a) True
b) False
Answer: b
Explanation: UWB technology is appropriate for the high-performance wireless home network, which mandates sup
port for large bit rate (50 Mbps), high-speed, affordable connectivity between devices, and simultaneous data transm
ission from multiple devices, and full-motion video capability.
a) Large spectrum
b) Lower price
c) Pulse data
d) Large interference
Answer: d
Explanation: The combination of a larger spectrum, lower power, and pulsed data means that UWB causes less inter
ference than narrowband radio designs while yielding low probability of detection and excellent multipath immunity
.
9. UWB systems are very complex, since they use radio frequency/intermediate frequency conversion stages.
a) True
b) False
Answer: b
Explanation: UWB systems are much less complex, since they do not use any radio frequency/intermediate frequenc
y (RF/IF) conversion stages, local oscillators, mixers, and other expensive surface acoustic wave (SAW) filters com
mon to traditional radio technologies.
1. _______ is responsible for tunneling multicast packets to the MS’s currently subscribed FA.
a) True
b) False
Answer: a
Explanation: Every MS can have only one MHA, which dynamically changes based on the location of the MS, wher
eas a HA of an MS never changes. The protocol requires that each MHA must be a multicast group member.
3. _______ provides a fast and efficient handoff for MSs in foreign networks.
a) MHA
b) MMP
c) CBT
d) MS
Answer: b
Explanation: MMP provides a fast and efficient handoff for MSs in foreign networks. It also enables location-indepe
ndent addressing.
5. ________ designed for an Internet work environment with small wireless cells.
a) MMP
b) RMDP
c) RM2
d) Mobicast
Answer: d
Explanation: Mobicast is designed for an Internet work environment with small wireless cells. It assumes that a set o
f cells are grouped together and are served by a domain foreign agent (DFA).
6. ________ serve as multicast forwarding agents and are meant to isolate the mobility of the mobile host from the
main multicast delivery tree.
a) DFA
b) MHA
c) FA
d) MMP
Answer: a
Explanation: DFAs serve as multicast forwarding agents and are meant to isolate the mobility of the mobile host fro
m the main multicast delivery tree. This hierarchical mobility management approach tries to isolate the mobility of t
he FAs from the main multicast delivery tree.
7. Mobicast is based on a method proposed by the IETF to support multicast over Mobile-IP.
a) True
b) False
Answer: a
Explanation: Mobicast is based on a method proposed by the IETF to support multicast over Mobile-IP. To handle t
he case when an MS is both the source and recipient of a multicast session, one needs to minimize the possibility of
rebuilding the complete multicast tree at each foreign domain the MS visits.
a) MMP
b) RMDP
c) RM2
d) Mobicast
Answer: b
Explanation: The reliable multicast data distribution protocol (RMDP) is meant to be implemented for use on the M
BONE. It relies on the use of FEC and ARQ information to provide reliable multicast service.
9. __________ is a reliable multicast protocol and is used for both wired and wireless environments.
a) MMP
b) RMDP
c) RM2
d) Mobicast
Answer: c
Explanation: Reliable mobile multicast (RM2) is a reliable multicast protocol and is used for both wired and wireles
s environments. RM2 guarantees sequential packet delivery to all its multicast members without any packet loss.
a) MMP
b) RMDP
c) RM2
d) Mobicast
Answer: c
Explanation: RM2 relies on the Internet group management protocol (IGMP) to manage multicast group membershi
p. RM2 is a hierarchical protocol that divides a multicast tree into subtrees, whereby subcasting within these smaller
regions is applied using a tree of retransmission servers.
a) Only category 5
b) Only category 4
c) Only category 3
d) Category 3,4 and 5
Answer: a
Explanation: Category information is used to allow the eNB to communicate effectively with all the UEs connected t
o it. The UE-category defines a combined uplink and downlink capability. Only UE category 5 supports 64 QAM on
the uplink.
3. What is the minimum amount of RF spectrum needed for an FDD LTE radio channel?
a) 1.4 MHz
b) 2.8 MHz
c) 5 MHz
d) 20 MHz
Answer: b
Explanation: In telecommunication, Long-Term Evolution (LTE) is a standard for high-speed wireless communicati
on for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA technologies. The minimum
amount of RF spectrum needed for an FDD LTE radio channel is 2.8 MHz.
a) UMTS
b) 3GPP
c) 3GPP2
d) ISO
Answer: b
Explanation: The 3rd Generation Partnership Project (3GPP) is a collaboration between groups of telecommunicatio
ns standards associations, known as the Organizational Partners. LTE (Long Term Evolution) introduced in 3GPP R
8, is the access part of the Evolved Packet System (EPS).
a) PHICH
b) PDCCH
c) PBCH
d) PCFICH
Answer: d
Explanation: PCFIH channel indicates the number of symbols used by the PDCCH. The actual number of OFDM sy
mbols occupied in any given subframe is indicated in the PCFICH (Physical Control Format Indicator Channel), whi
ch is located in the first OFDM symbol of each subframe.
a) Every symbol
b) Every slot
c) Every subframe
d) Every frame
Answer: c
Explanation: Resources can be located to the UE every subframe. CCE Index is the CCE number at which the contro
l channel data (PDCCH) is allocated. Normally this index changes for each subframe, i.e. even the same PDCCH dat
a (e.g, a PDCCH for the same UE) allocated in each subframe changes subframe by subframe.
a) 10 MHz
b) 20 MHz
c) 1.4 MHz
d) 5 MHz
Answer: b
Explanation: The LTE format was first proposed by NTT DoCoMo of Japan and has been adopted as the internation
al standard. LTE-Advanced accommodates the geographically available spectrum for channels above 20 MHz.
9. Which RLC mode adds the least amount of delay to user traffic?
10. How much bandwidth is required to transmit the primary and secondary synchronization signals?
a) 1.08 MHz
b) 1.4 MHz
c) 930 kHz
d) 20 MHz
Answer: a
Explanation: Cell synchronization is the very first step when UE wants to camp on any cell. 1.08 MHZ is required to
transmit the primary and secondary synchronization signals.
a) Acceptance cell
b) Barred cell
c) Reserved cell
d) Suitable cell
Answer: d
Explanation: A suitable cell is a cell on which the UE may camp on to obtain normal service. The UE shall have a v
alid USIM and such a cell shall fulfil all the following requirements. It provides the best level of service for average
subscribers.
1. Which type of cell provides the best level of service for average subscribers?
a) 7
b) 140
c) 12
d) 40
Answer: b
Explanation: There are two different type of Cyclic Prefix. One is normal Cyclic Prefix and the other is ‘Extended C
yclic Prefix’ which is longer than the Normal Cyclic Prefix. Normal cyclic prefix contains 140 symbols in 1 frame.
2. With the normal cyclic prefix, how many symbols are contained in 1 frame?
a) 1-3 Gbps
b) 2-5 Gbps
c) 1-3 Mbps
d) 2-5 Mbps
Answer: d
Explanation: Verizon 4G LTE wireless broadband is 10 times faster than 3G able to handle download speeds betwee
n 5 and 12 Mbps (Megabits per secon
d) and upload speeds between 2 and 5 Mbps.
a) Multirate management
b) Fully converged services
c) Software dependency
d) Diverse user devices
Answer: a
Explanation: 4G is the fourth generation of broadband cellular network technology, succeeding 3G. Its characteristic
s include fully converged services, software dependency and diverse user devices.
a) Verizon Wireless
b) AirTouch
c) Netflix
d) V Cast
Answer: a
Explanation: In 2007, Verizon announced plans to develop and deploy its fourth generation mobile broadband netwo
rk using LTE, the technology developed within the Third Generation Partnership Project (3GPP) standards organizat
ion.
9. In 2007 ____________ announced its plan to transmit its network to 4G standard LTE with joint efforts of Vodaf
one group.
a) PDCP
b) RLC
c) MAC
d) PHY
Answer: c
Explanation: Hybrid automatic repeat request (hybrid ARQ or HARQ) is a combination of high-rate forward error-c
orrecting coding and ARQ error-control. It is part of the MAC layer.
4. What processing step combines multiple OFDM subcarriers into a single signal for transmission?
a) FFT
b) IFFT
c) RF combining
d) Channel mapping
Answer: b
Explanation: IFFT combines multiple OFDM subcarriers into a single signal for transmission. These transforms are i
mportant from the OFDM perspective because they can be viewed as mapping digitally modulated input data (data s
ymbols) onto orthogonal subcarriers.
5. Which property of OFDMA system allows adjacent subcarriers to be used without interference?
a) Orthogonality
b) Orthodoxy
c) Octagonality
d) Originality
Answer: a
Explanation: Orthogonality of sub-carriers simply means their correlation is zero. Orthogonality in OFDMA system
allows adjacent subcarriers to be used without interference.
6. In OFDMA, what is the relationship between the subcarrier spacing f and symbol time t?
a) f=t
b) f=1/2t
c) f=1/t
d) no relation
Answer: c
Explanation: In OFDMA, the relationship between the subcarrier spacing f and symbol time t is f=1/t. They are inve
rsely proportional.
a) True
b) False
Answer: b
Explanation: OFDM has developed into a popular scheme for wideband digital communication, used in applications
such as digital television and audio broadcasting, DSL internet access, wireless networks, power line networks, and
4G mobile communications.
a) True
b) False
Answer: b
Explanation: ODMA does not use complex equalizers. In OFDM, the equalizer only has to multiply each detected su
b-carrier (each Fourier coefficient) in each OFDM symbol by a constant complex number, or a rarely changed value.
9. When we divide band of Orthogonal Frequency Division Multiplexing (OFDM) into sub bands, it diminishes effe
cts of __________
a) noise
b) collision
c) interference
d) signals absence
Answer: c
Explanation: OFDM uses the same bandwidth to deliver roughly the same data rate as a single carrier modulation by
introducing multiple lower-bandwidth channels. Each of the lower-bandwidth channels has a lower rate, and by co
mbining them together, the original rate is achieved.
a) 18 Mbps
b) 200 Mbps
c) 50 Mbps
d) 54 Mbps
Answer: a
Explanation: The IEEE 802.11a standard specifies a modulation that divides a high-speed serial information signal i
nto multiple lower-speed sub signals. Common data rates of IEEE 802.11 OFDM is 18 Mbps.
a) 1980
b) 1990
c) 1980
d) 1975
Answer: b
Explanation: Since the initial development in the year 1990, MIMO Wireless Communications have become integral
part of the most forthcoming commercial and next generation wireless data communication systems.
a) True
b) False
Answer: a
Explanation: MIMO is one of several forms of smart antenna technology, the others being MISO (multiple input, sin
gle output) and SIMO (single input, multiple output). It is an antenna technology for wireless communications in wh
ich multiple antennas are used at both the source and the destination.
5. MIMO technology makes advantage of a natural radio wave phenomenon called _________
a) Reflection
b) Multipath
c) Refraction
d) Diffraction
Answer: b
Explanation: MIMO technology makes use of multipath phenomenon to maximize transmission by receiving bounce
d signals from obstructions. Multipath is a phenomenon in wave propagation.
a) 4G
b) Wifi
c) WiMax
d) AMPS
Answer: d
Explanation: MIMO is used in mobile radio telephone standards such as recent 3GPP and 3GPP2. In 3GPP, High-Sp
eed Packet Access plus (HSPA+) and Long Term Evolution (LTE) standards take MIMO into account. Moreover, M
IMO is also used in Wifi and WiMax.
a) True
b) False
Answer: a
Explanation: MIMO provides a way of utilising the multiple signal paths that exist between a transmitter and receive
r to significantly improve the data throughput available on a given channel with its defined bandwidth. It uses multip
le antennas at the transmitter and receiver along with some complex digital signal processing.
a) STTD
b) SM
c) Collaborative Uplink MIMO
d) MU-MIMO
Answer: a
Explanation: Space Time Transmit Diversity (STT
d) is a technique of transmit diversity used in UMTSS third-generation cellular systems. Space Time Transmit Diver
sity is optional in the UTRANN air interface, but compulsory for user equipment.
9. _______ is a transmission method used in MIMO wireless communications to transmit encoded data signals inde
pendently.
a) STTD
b) SM
c) Collaborative Uplink MIMO
d) MU-MIMO
Answer: b
Explanation: Spatial multiplexing is a transmission method used in MIMO wireless communications to transmit enc
oded data signals independently and separately (so-called streams) from each of the multiple transmit antennas.
10. _______ is an additional open-loop MIMO technique considered by the WiMAX vendors.
a) STTD
b) SM
c) Collaborative Uplink MIMO
d) MU-MIMO
Answer: c
Explanation: Collaborative MIMO is an open-loop MIMO technique considered by the WiMAX vendors to surge th
e spectral efficiency and capacity of the uplink communications path. It is compared with the regular spatial multiple
xing, wherein data streams are transmitted multiplying from multiple antennas on the same device.