Sie sind auf Seite 1von 12

Quiz on 2xG technology 1. _______ is a first-generation cellular phone system. a. AMPS b. D-AMPS c. GSM d. None of the above 2.

__________ is a second-generation cellular phone system. a. AMPS b. D-AMPS c. GSM d. None of the above 3. ____________ is a digital version of AMPS. a. AMPS b. D-AMPS c. IS-95 d. None of the above 4. ___________ is a second-generation cellular phone system used in Europe. a. AMPS b. D-AMPS c. IS-95 d. None of the above 5. ________ is a second-generation cellular phone system based on CDMA and DSSS. a. AMPS b. D-AMPS c. IS-95 d. None of the above 6. The __________ cellular phone system will provide universal personal communication. a. 1st generation b. 2nd generation c. 3rd generation d. None of the above 7. In a ______ handoff, a mobile station only communicates with one base station. a. Hard b. Soft c. Medium d. None of the above 8. In a ______ handoff, a mobile station can communicate with two base stations at the same time. a. Hard b. Soft c. Medium d. None of the above 9. _______ is an analog cellular phone system using FDMA. a. AMPS b. D-AMPS c. GSM d. None of the above

10. AMPS operates in the _____ band. a. 800-MHz b. 900-MHz c. 1800-MHz d. None of the above 11. In AMPS, each band is divided into ______ channels. a. 800 b. 900 c. 1000 d. None of the above 12. AMPS has a frequency reuse factor of _______. a. 1 b. 3 c. 5 d. 7 13. AMPS uses ______ to divide each 25-MHz band into channels. a. FDMA b. TDMA c. CDMA d. OFDMA 14. D-AMPS uses ______ to divide each 25-MHz band into channels. a. FDMA b. TDMA c. CDMA d. Both a and b 15. GSM allows a reuse factor of _______. a. 1 b. 3 c. 5 d. 7 16. GSM is a digital cellular phone system using ________. a. FDMA b. TDMA c. CDMA d. Both a and b 17. IS-95 is based on ____________. a. CDMA b. FDMA c. TDMA d. All of the above 18. IS-95 uses the _______ satellite system for synchronization. a. GPS b. Iridium c. Teledesic d. None of the above 19. In an IS-95 system, the frequency-reuse factor is normally _____. a. 1 b. 3

20.

21.

22.

23. 24.

25. 26.

27.

28.

29.

c. 5 d. 7 If you have 5 MHz frequency band what will be the maximum number of channels as per GSM system? a. 25 b. 35 c. 20 d. 24 Which channel is used to transmit random access signals? a. BCCH b. CCCH c. SDCCH d. TCH The Value Range of Timing Advance (TA) in GSM is? a. 0-31 b. 0-61 c. 0-63 d. 0-128 In GSM carrier separation is 200KHz whereas in CDMA it is 5MHz (True/False) When MS is in dedicated mode, the information for non urgent procedure like radio link supervision measurement, transmit power control and timing advance data, is carried on a. SDCCH b. FACCH c. TCH d. SACCH Ciphering key Kc is never transmitted over radio interface. True/ False In up-link direction ARFCN (Absolute Radio Frequency Carrier Number) of 100 corresponds to frequency of (where 1 = ARFCN = 124) a. 909.8 MHz b. 910 MHz c. 910.2 MHz d. 910.5 MHz For intra-BSC normal Hand-over (not forced Hand-over) unit responsible for taking a decision that Hand-over is required a. BSC b. MSC c. VLR d. HLR In case inter-MSC Handover, MSC to MSC communication makes use of a. MAP-D Interface b. MAP-E Interface c. MAP-C Interface d. A-bis The maximum data rate supported by GSM system is a. 4800bps b. 2100bps c. 6900bps d. 7000bps

30. In GSM the signaling protocol supported BTS and BSC is a. LAPD b. LAPDm c. SS7 d. MAP 31. Location Area is an area covered by ______. a. BTS b. BSC c. MSC/VLR d. None of the above 32. Which Modulation Scheme is used in GSM and GPRS a. PSK b. GMSK c. ASK d. FSK 33. What is the output power of BTS a. 33DBm b. 43DBm c. 53DBm d. 63DBm 34. In CDMA, the pseudo-random code must have the following property a. It must be deterministic b. It must appear random to a listener without prior knowledge of the code c. The code must have a long period d. All of the above 35. In IS-95, two types of Maximum-Length PN Sequences or PN Codes are used: The Short PN Code and the Long PN Code. What is the maximum length of the Short PN Sequence when the PN Code is generated with a 15-stage Linear Shift Register? a. 16,384 chips b. 32,768 chips c. 1,228,800 chips d. None of the above 36. How are P/N codes generated? a. With a Linear Shift Register b. With the Encoder c. With the Vocoder d. With the Data Burst Randomizer (DBR) 37. When corresponding bits from two sequences have the same parity (or match each other) it is called an Agreement "A". Likewise, when corresponding bits from two sequences do not have the same parity it is called a Disagreement "D". How is the Correlation value determined? a. Correlation Value = Total number of "A" + Total number of "D" 2 b. Correlation Value = Total number of "A" - Total number of "D" c. Correlation Value = Total number of "A" Total number of "D" d. None of the above are correct 38. If the Long PN Code runs at a speed of 1,228,800 chips per second, what is the repetition cycle? a. 26.67 ms b. 440 ms

39.

40.

41.

42.

43.

44.

45.

46.

47.

c. 3 - 4 days d. 41 - 42 days What is the maximum length of a P/N Sequence generated by an N-stage Linear Shift Register? a. 2exp(N) -1 b. 3exp(N) -1 c. 2esp(N) +1 d. 3esp(N) +1 Which of these signaling is used for the PSTN network interface a. R2 b. V5.2 c. CCS No. 7 d. All of the above Which of these channel is unidirectional? a. Broadcast b. Call setup c. Assigned d. None of the above CDMA or code division multiple access was developed by Qualcomm Inc. and it became an international standard in _______ a. 1991 b. 1995 c. 1998 d. 2001 In GSM Handset interoperability is provided by _______and in CDMA it is _________. a. SIM, ESN b. SIM, RUIM c. RUIM, SIM d. ESN, SIM In GSM handoff is _________ while in CDMA it is ___________. a. Hard, soft b. Soft, hard c. Hard, hard d. Soft, soft Various factors such as echoes, call dropping, or voice distortion are almost non-existent in ______, whereas in ________, there is a high probability of errors. a. GSM, CDMA b. CDMA, GSM c. GSM, CorDECT d. None of the above GSM, being a relatively simpler technology, uses________amount of cell phone battery than CDMA. a. Less b. More c. Same d. None of the above Message center (MXE) handles _____________ cell broadcast, voice mail, and notification. a. voice mail b. fax mail, e-mail

48.

49.

50.

51.

52.

53.

54.

c. short message service d. All of the above The _________ is a database that contains information about the identity of mobile equipment that prevents calls from stolen, unauthorized, or defective mobile stations. a. EIR b. HLR c. AUC d. XME The __________ protects network operators from different types of fraud found in today's cellular world. a. AUC b. EIR c. XME d. SMSC Which of these performs such functions as toll ticketing, network interfacing, common channel signaling? a. MSC b. VLR c. AUC d. HLR GSM is a digital system with an over-the-air bit rate of _________ a. 9.6 kbps b. 56 kbps c. 144 kbps d. 270 kbps The separation between adjacent carrier frequencies is called In GSM, this is __________. a. 100 KHz b. 200 KHz c. 225 KHz d. 300 KHz The cluster size of the frequency reuse pattern of a hexagonal cellular system can only take on particular values. Namely a. 1,4,9,16,25,.. b. 1,3,4,7,9,11,... c. 1,3,4,6,9,10,.. d. None of the above The reuse distance increases with the cluster size, more precisely a. with the square root of the cluster size b. proportional to cluster size c. with the square of the cluster size d. with the logarithm of the cluster size

55. CAVE is used for CDMA authentication, and CAVE38 is used for iDEN authentication, which is compatible with GSM A3/A8 authentication.(True/False) 56. On the surface, queuing of handover requests seems to be a bad scheme and not possible since handover must not be noticed (delay sensitive) by the user. But it turns out that queuing handover request is possible. Why is handover request queuing possible?

57.

58.

59.

60.

61.

62.

63.

64.

a. Handover request taking up to 800ms would not be noticed by the user. Queuing is possible within this time. b. There exist a time interval between the mobile phone reaching the handover threshold and the receiver threshold. c. Handover request can be made small packets. Therefore the queue can be processed very quickly. d. The alternative to queuing handover request is queuing new originating calls which is far more delay sensitive. Therefore queuing handover request (although delay sensitive) is a better idea. Which Indian company was in race of Hutch Auction ? a. Reliance Communication b. TATA Telecom c. Virgin Mobile d. BSNL What is the length of IMEI number ? a. 16 Digits b. 10 Digits c. 15 Digits d. 20 Digits What maximum speed you can get if you use EDGE technology for mobile internet ? a. 144 kbps b. 256 kbps c. 236.8 kbps d. 512 kbps The uplink frequency of P-GSM system is a. 1850-1910Mhz b. 1710-1785Mhz c. 890-915 Mhz d. None of the above The technique adopted to increase the system capacity and reduce co-chl interference is a. High power BTS b. By installing the Omni directional antenna c. Sectorisation d. None of the above The remote and sparsely populated areas will be covered by a. Micro cell b. Macro cell c. Pico cell d. Umbrella cell The cell having the same number in the adjacent cluster using the same set of RF channels are termed as a. Adjacent cell b. Co channel cell c. Macro cell d. Selective Cell The terminal is under observation from the network for the possible problems. Under which list will this belong in EIR a. White list

65.

66.

67.

68.

69. 70.

71.

72.

73. 74.

b. Grey list c. Black list d. Blue list The process of channel coding, Encryption, Multiplexing and modulation for Trans direction and reverse for reception are to be carried out by a. BTS b. BSC c. MSC d. MS Which code is used in CDMA reverse channel a. Long code b. Shot code c. 64-ary Orthogonal code d. All of the above A-interface is mainly used to transmit the following information. a. BSS management information b. Call processing c. Mobility management information d. All of the above Which modulation is used in GSM Technology? a. FSK b. QPSK c. GMSK d. MSK Authentication triplets consist of RAND, SRES and Kc. (True/False) The Kc is the_________ciphering key that is used in the A5 encryption algorithm to encipher and decipher the data that is being transmitted on the Um interface. a. 60-bit b. 64-bit c. 70-bit d. 32-bit The___algorithm computes a 32-bit Signed Response (SRES). The Ki and RAND are inputted into the___ algorithm and the result is the 32-bit SRES. The___ algorithm resides on the SIM card and at the AuC. a. A3 b. A8 c. A5 d. All of the above The RAND is a random 128-bit number that is generated by a. EIR b. AUC c. MSC d. VLR The Ki is only stored on the SIM card and at the AuC.(True/False) The AuC may generate many sets of Triplets and send them to the requesting MSC/VLR. This is in order to reduce the signaling overhead that would result if the MSC/VLR requested one set of triplets every time it wanted to authenticate the MS.(True/False)

75. COMP128 is a single keyed hash function that takes the place of the A3 and A8 algorithms and generates the SRES and Kc in a single function. The Ki and RAND are fed into the COMP128 hash and the result is a 32-bit SRES and a 54-bit Kc.(True/False) 76. _______________channel is used by a BTS to notify the MS of the assignment of an initial SDCCH for initial signaling. a. RACH b. AGCH c. BCCH d. SCH 77. RXLEV is a number from 0 to 63 that corresponds to a dBm value range. 0 (less than -110 dB) represents the weakest signal and 63 the strongest which has a. -48dB b. More than -48dB c. Less than -48dB d. None of the above 78. Cell reselection refers to the process of a MS choosing a new cell to monitor once it has already registered and is camped on a cell. It is important to distinguish that selection and reselection are done by the MS itself and not governed by the network.(True/False) 79. There is no any kind of handover in GPRS (True/False) 80. When a MS reselects a new cell it does not need to notify the network unless that new cell is in a different Location Area.When a MS moves into a new location area it must do a location update which generates signal messaging between the BTS, BSC, MSC, VLR, and HLR. If a MS is located along the border of two location areas then it will see cells in both location areas. A MS along the borderline might reselect a cell in one location area and then a few minutes later reselect a cell in the other location area and continuously bounce back and forth between location areas generating too much signaling overhead and putting strain on the network.(True/False) 81. SGSN is an element that understands Radio access on one side and IP on other side. Whereas GGSN has IP on both sides. (True/False) 82. Which protocol is used between SGSN and GGSN? a. UDP b. TCP c. GTP d. None of the above 83. The signaling of SS7 features _____ signaling. a. in-band b. out-of-band 84. SS7 _____ multi-frequency tones for signaling. a. Uses b. Does not use 85. Associated signaling _____ for signaling to network elements to which there is no direct trunk connection. a. Allows b. Does not allow 86. SSPs _____ the packet switches of the SS7 network. a. Are b. Are not 87. STPs and SCPs are not customarily deployed in pairs.(True/False)

88. Links that connect non-mated STP pairs in different networks may be referred to as ______________. a. B links b. D links c. B/D links d. Any of the above 89. The SCCP supports __________________. a. Routing to subsystems b. Global title translation c. Load sharing among SCPs d. All of the above and other functions as well 90. An REL is a message that indicates that switches at both ends have released the trunk.(True/False) 91. The spreading factor of the DPCCH is a. 64 b. 128 c. 256 d. 512 92. Which of these channel is optional? a. RACH b. BCH c. DSCH d. FACH 93. What is the spectrum used in WCDMA? a. 1.25MHz b. 5MHz c. 10MHz d. 128MHz 94. The code that is used to spread the signal is called a a. PN Code b. Walsh Code c. Random Code d. All of the above 95. What is the chip rate for IS-95? a. 1.2288Mcps b. 2.453Mcps c. 90Mcps d. 120Mcps 96. What will be the correlation of two codes, if the two codes are identical? a. 0 b. 1 c. 1.1 d. Infinite 97. ___________is considered when two cells (or sectors) of the same site are involved. a. Hard b. Soft c. Both a & b d. Neither a nor b

98. Unlike GSM, in WCDMA there is ____________dedicated transport channel, DCH a. One b. Two c. Three d. Four 99. Which of this a downlink channel that carries control to UE known to locate in the given cell a. BCH b. FACH c. PCH d. SCH 100. What is full form of EV-DO? a. Evolution-Data Optimized b. Evolution-Data only c. Evolution-Data owned d. Both a & b 101. Arrange the following in chronological order: 1. IS 95A 2. TIA/EIA 95B 3.1X EVDO REV A 4.CDMA 2000 REV A 5.1X EVDO a. 1,2,3,4,5 b. 1,2,4,3,2 c. 1,2,4,5,3 d. 2,1,4,5,3 102. Access Terminal sends a Route Update Message to the system whenever: a. It transmits on the Access Channel b. In idle state, it notices the serving sector is far from the sector where last updated c. In connected state, whenever it notices the Handoff Parameters suggest a change d. Any of the above 103. What is the theoretical speed of EVDO network Rev 0? a. 144Kbps b. 256Kbps c. 2.4Kbps d. 3.1 Mbps 104. Referring to the following picture of WiMAX OFDM symbol structure, which part represents data subcarriers?

a. b. c. d.

A B C D

105. a. b. c. d. 106. a. b. c. d.

Mobile WiMAX supports channel bandwidths from 1.25 to 5 MHz 1.25 to 9 MHz 1.25 to 16 MHz 1.25 to 20 MHz In WiMAX Tx/Rx chain, FFT (Fast Fourier Transform) is used in _________ process. Modulation Demodulation Filtering Digital to Analog conversion

Das könnte Ihnen auch gefallen