InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How Are Gprs Terminals Classified? |
Answer»
|
|
| 2. |
Explain Gprs? |
Answer»
|
|
| 3. |
What Is Frequency Re-use? |
|
Answer» Frequency Re-use:
Frequency Re-use: |
|
| 4. |
Explain Channel Coding? |
|
Answer» CHANNEL coding :
Channel coding : |
|
| 5. |
Explain Interleaving? |
|
Answer» Interleaving:
Interleaving: |
|
| 6. |
Explain Equalisation? |
Answer»
Equalisation: |
|
| 7. |
Which Uplink/ Downlink Spectrum Is Allocated To Following? A.) Gsm – 900 B.) Dcs – 1800 |
|
Answer» GSM – 900: Uplink spectrum is 890.2–914.8 and DOWNLINK spectrum is 935.2–959.8 DCS – 1800: Uplink spectrum is 1710.2–1784.8, and downlink spectrum is 1805.2–1879.8 GSM – 900: Uplink spectrum is 890.2–914.8 and downlink spectrum is 935.2–959.8 DCS – 1800: Uplink spectrum is 1710.2–1784.8, and downlink spectrum is 1805.2–1879.8 |
|
| 8. |
Explain The Following Techniques In Gsm: A.) Sectorization Of A Cell B.) Frequency Re-use C.) Transmitted Power Control D.) Discontinuous Transmission |
|
Answer» Sectorization of a cell :
Frequency Re-use :
TRANSMITTED Power Control :
Discontinuous Transmission :
Sectorization of a cell : Frequency Re-use : Transmitted Power Control : Discontinuous Transmission : |
|
| 9. |
Explain The Services Offered By Gsm. |
Answer»
|
|
| 10. |
Explain The Following Two Types Of Hand Off In Cdma System: A.) Soft Handoff B.) Softer Handoff |
|
Answer» Soft handoff :
Softer handoff :
Soft handoff : Softer handoff : |
|
| 11. |
Explain Following Forward Link Channels In Cdma System: A.) Pilot Channel B.) Sync. Channel |
|
Answer» Pilot Channel :
Sync-Channel :
Pilot Channel : Sync-Channel : |
|
| 12. |
What Is The Difference Between Cdma And Gprs? Which Of Them Is Better? Why? |
|
Answer» The Differences:
The Differences: |
|
| 13. |
What Are The Difference Between Tdma? |
|
Answer» CDMA and TDMA : CDMA
TDMA :
CDMA and TDMA : CDMA TDMA : |
|
| 14. |
What Is The Differentiate Between Cdma And Fdma ? |
|
Answer» CDMA and FDMA CDMA :
FDMA :
CDMA and FDMA CDMA : FDMA : |
|
| 15. |
What Is The Importance Of Cdma In Today’s Cellular World? |
Answer»
|
|
| 16. |
What Is The Difference Between Cdma And Gsm? |
|
Answer» The important differences are: DATA Transfer Speed:
Subscriber Identity Module (SIM) cards:
Roaming:
International Roaming:
The important differences are: Data Transfer Speed: Subscriber Identity Module (SIM) cards: Roaming: International Roaming: |
|
| 17. |
Explain Ev-do/ Evdo? |
Answer»
|
|
| 18. |
Explain Dect? |
Answer»
|
|
| 19. |
Explain Edge? |
Answer»
|
|
| 20. |
Explain Cdma One And Cdma2000? |
|
Answer» CDMA One :
CDMA2000 :
CDMA One : CDMA2000 : |
|
| 21. |
What Is Cdma? Explain The Technology. |
Answer»
|
|
| 22. |
What Is Cdma2000? |
Answer»
|
|
| 23. |
What Is International Telecommunications Union And What Are Its Functions? |
Answer»
Functions of International Telecommunications Union:
Functions of International Telecommunications Union: |
|
| 24. |
Explain Umts? |
Answer»
|
|
| 25. |
Explain Hlr (home Location Register) , Iden(integrated Digital Enhanced Network), I-appli ? |
|
Answer» HLR (Home Location Register) :
iDEN (Integrated Digital Enhanced Network) :
i-appli :
HLR (Home Location Register) : iDEN (Integrated Digital Enhanced Network) : i-appli : |
|
| 26. |
Explain Gprs ( General Packet Radio Service)? |
|
Answer» GPRS ( General Packet Radio Service) :
GPRS ( General Packet Radio Service) : |
|
| 27. |
How Is 3g Different From 2g? |
Answer»
|
|
| 28. |
What Are The Advantages And Disadvantages Of 3g? |
|
Answer» Advantages of 3G:
Disadvantages of 3G:
Advantages of 3G: Disadvantages of 3G: |
|
| 29. |
What Are 3g Standards? |
|
Answer» 3G standards: UMTS:
CDMA2000
3G standards: UMTS: CDMA2000 |
|
| 30. |
What Is 3g? |
|
Answer» Definition: 3G, known as 3RD Generation, is a standard for mobile / cellular phones. It provides the services that FULFILL the International Telecommunication Union specifications. The application services of 3G include wireless voice telephone, mobile internet access, video calls and mobile television – all in a mobile environment.
Definition: 3G, known as 3rd Generation, is a standard for mobile / cellular phones. It provides the services that fulfill the International Telecommunication Union specifications. The application services of 3G include wireless voice telephone, mobile internet access, video calls and mobile television – all in a mobile environment. |
|
| 31. |
What Does Fec Mean In Bluetooth? |
Answer»
|
|
| 32. |
Explain The Term 'airport' In Bluetooth? |
|
Answer» Airport is standard (802.11) and has a FASTER transfer rate. Technologically it is more ADVANCED, more rugged and smaller and CAPABLE of being used anywhere. It is 10mb/sec, 50 meters, 10 active devices. Apparently, Bluetooth is 1mb/sec, 10 meters and 7 active devices. Airport is standard (802.11) and has a faster transfer rate. Technologically it is more advanced, more rugged and smaller and capable of being used anywhere. It is 10mb/sec, 50 meters, 10 active devices. Apparently, Bluetooth is 1mb/sec, 10 meters and 7 active devices. |
|
| 33. |
What Are The Technical Characteristics Of Bluetooth? |
|
Answer» The following are the technical characters of a Bluetooth device: The devices are either a one chip solution or multiple chips in general. Blue tooth device has three main parts – RF, baseband processor and link manager (COULD be a CPU core like 8 or 16 bit REDUCED Instruction SET Computer. A BT module in multiple chips, usually 2 or 3 chip, like RF on a chip are produced by certain vendors. For a single chip solution, the following information can be used for referencing from a particular vendor.
The components, the chip, memory and the crystal, antenna could be placed on a PCB about 20mm x 15mm. The thickness of the chip is about 1.25mm or 1.55 mm.. The following are the technical characters of a Bluetooth device: The devices are either a one chip solution or multiple chips in general. Blue tooth device has three main parts – RF, baseband processor and link manager (could be a CPU core like 8 or 16 bit Reduced Instruction Set Computer. A BT module in multiple chips, usually 2 or 3 chip, like RF on a chip are produced by certain vendors. For a single chip solution, the following information can be used for referencing from a particular vendor. The components, the chip, memory and the crystal, antenna could be placed on a PCB about 20mm x 15mm. The thickness of the chip is about 1.25mm or 1.55 mm.. |
|
| 34. |
Explain The Modulation Techniques Used In Bluetooth Technology? |
|
Answer» Blue tooth uses FREQUENCY HOPPING Spread SPECTRUM technique which is used in spread spectrum signal transmission. During radio transmission, frequencies are switched repeatedly, to help reducing unlawful access to cross paths which causes interruptions. FHSS makes BLUETOOTH communication more robust and secure. The speed of interferences from other devices will be reduced, though it will not cause the transmission to stop. New technologies such as MIMO, BLAST and space-time coding are used in transmission data communication systems. Blue tooth uses Frequency Hopping Spread Spectrum technique which is used in spread spectrum signal transmission. During radio transmission, frequencies are switched repeatedly, to help reducing unlawful access to cross paths which causes interruptions. FHSS makes Bluetooth communication more robust and secure. The speed of interferences from other devices will be reduced, though it will not cause the transmission to stop. New technologies such as MIMO, BLAST and space-time coding are used in transmission data communication systems. |
|
| 35. |
What Is The Signal Strength Transmitted By Cell Phones? |
|
Answer» The magnitude of the ELECTRIC field at a reference point, which is SIGNIFICANT distance from the transmitting ANTENNA, is KNOWN as signal strength. Signal strength is expressed in voltage/length or signal power received by the antenna. In mobile phones, the signal strength is usually expressed in dB-microvolts per meter or in decibels above a reference level of ONE milliwatt. The magnitude of the electric field at a reference point, which is significant distance from the transmitting antenna, is known as signal strength. Signal strength is expressed in voltage/length or signal power received by the antenna. In mobile phones, the signal strength is usually expressed in dB-microvolts per meter or in decibels above a reference level of one milliwatt. |
|
| 36. |
Which Technology Is Used To Avoid Interference In Bluetooth? |
|
Answer» Blue tooth uses frequency hopping TECHNOLOGY. In this technology, 79 hop frequencies are transmitted and received from 2402 to 2480 mhz. hopping in a pseudo random sequence at a rate of 1600 times in a second. Guassian frequency shift keying MODULATION is utilized with a maximum data transfer rate of 721 kbps. Bluetooth protocol stack is developed and TCP/IP imported LAYERS are used in this technology. Interference is being avoided by utilizing the frequency-hop(FH) spread spectrum technology. It is ADAPTABLE for low-power, low-cost radio implementations and also used in certain wireless LAN products. The major advantage with this technology transmission is the high rate of 1600 hops / ps. Another advantage is, short PACKET length is also used by Bluetooth. Blue tooth uses frequency hopping technology. In this technology, 79 hop frequencies are transmitted and received from 2402 to 2480 mhz. hopping in a pseudo random sequence at a rate of 1600 times in a second. Guassian frequency shift keying modulation is utilized with a maximum data transfer rate of 721 kbps. Bluetooth protocol stack is developed and TCP/IP imported layers are used in this technology. Interference is being avoided by utilizing the frequency-hop(FH) spread spectrum technology. It is adaptable for low-power, low-cost radio implementations and also used in certain wireless LAN products. The major advantage with this technology transmission is the high rate of 1600 hops / ps. Another advantage is, short packet length is also used by Bluetooth. |
|
| 37. |
What Is Rj-45? |
Answer»
|
|
| 38. |
What Is Meant By The Term 'ip Spoofing'? |
|
Answer» IP Spoofing: Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a TRUSTED host, for gaining unauthorized access to computer systems. The hacker / intruder FIRST utilize a variety of techniques for FINDING an IP address of a trusted host. Later he MODIFIES the packet headers, in order to give an illusion that the packets are sent from the host. IP Spoofing: Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a trusted host, for gaining unauthorized access to computer systems. The hacker / intruder first utilize a variety of techniques for finding an IP address of a trusted host. Later he modifies the packet headers, in order to give an illusion that the packets are sent from the host. |
|
| 39. |
List Out The Differences Between Udp And Tcp? |
Answer»
|
|
| 40. |
Explain The Following Terms: Icmp, Arp, Multicast, Broadcast |
Answer»
|
|
| 41. |
Explain The Working Of Trace Route? |
|
Answer» Trace route works by increasing the time-to-live value of every SUCCESSIVE packets sent in batch. Every three packets that were sent first, have a time-to-live value 1. The next three packets have a TTL value of 2 and so on. The host decrements the TTL value by one and the packet is FORWARDED to the next host, when a packet passes through a host. When a packet (with a time-to-live value of 1) reaches a host, the packets will be discarded by the host, and an ICMP time exceeded packet is sent to the sender. A list of HOSTS, whose packets have traversed enrouted to the destination, is utilized by the trace route utility. Trace route works by increasing the time-to-live value of every successive packets sent in batch. Every three packets that were sent first, have a time-to-live value 1. The next three packets have a TTL value of 2 and so on. The host decrements the TTL value by one and the packet is forwarded to the next host, when a packet passes through a host. When a packet (with a time-to-live value of 1) reaches a host, the packets will be discarded by the host, and an ICMP time exceeded packet is sent to the sender. A list of hosts, whose packets have traversed enrouted to the destination, is utilized by the trace route utility. |
|
| 42. |
Explain About Tcp Flow Control? |
|
Answer» TCP utilizes a flow control protocol from one end to another end for AVOIDING the sender to SEND data too quickly for the TCP receiver to receive and process it in a reliable manner. Machines of DIVERSE network can communicate quickly by having the flow control mechanism. TCP utilizes a sliding window flow control protocol. In every TCP segment, the receiver is specified in a receive window field, the additional received data that is to buffer for the connection. When a window of size 0 is advertised by a receiver, the data sending is stopped by the sender and starts the persist timer. The TCP dead lock situation is PROTECTED by the persist timer. The TCP sender sends the packet and the receiver sends the acknowledgement with the new size of window, at the TIME of expiring the persist timer. TCP utilizes a flow control protocol from one end to another end for avoiding the sender to send data too quickly for the TCP receiver to receive and process it in a reliable manner. Machines of diverse network can communicate quickly by having the flow control mechanism. TCP utilizes a sliding window flow control protocol. In every TCP segment, the receiver is specified in a receive window field, the additional received data that is to buffer for the connection. When a window of size 0 is advertised by a receiver, the data sending is stopped by the sender and starts the persist timer. The TCP dead lock situation is protected by the persist timer. The TCP sender sends the packet and the receiver sends the acknowledgement with the new size of window, at the time of expiring the persist timer. |
|
| 43. |
Bluetooth Is Called A Cable Replacement Technology. Explain. |
Answer»
|
|
| 44. |
What Is Bluetooth? |
Answer»
|
|