Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

How Are Gprs Terminals Classified?

Answer»
  • The GPRS services are CLASSIFIED into 12 service classes as per the duration of the time SLOTS occupied / frame.
  • Usually 5 time slots per frame are occupied including transmission time slots and RECEPTION time slots.
  • Increase in the number of occupied time slots certainly causes the increase in the entire duration of the occupied time slots, so that INCREASED amount of data transmission and receipt are enabled.
  • All the 12 service classes are further classified into higher and lower classes as per the relative duration of time slots.
  • Higher speed data communication can be transmitted with high-class GPRS service by setting high transmission POWER and setting the duration of the time slots long.

2.

Explain Gprs?

Answer»
  • Short form of General Packet Radio System.
  • GPRS is the next generation of GSM, and the basis of the 3G networks.
  • A packet oriented data service available to users of GSM and IS-136 type mobile phones.
  • It complements the existing services like circuit-switched cellular PHONE connections and the SMS.
  • Shortest set-up time is added for ISP connections.
  • An optimized mobile service for sending and receiving information across a mobile telephone NETWORK, with less cost.
  • GPRS provides data rates of mobile telephony and MODERATE speed data transfer, USING unused TDMA channels.
  • GPRS does not need dial-up modem connection.
  • Sending and receiving e-mails, surfing internet are among the features of GPRS.

3.

What Is Frequency Re-use?

Answer»

Frequency Re-use:

  • Frequency re-use is one of the techniques for improving capacity and spectral efficiency.
  • Commercial wireless SYSTEMS are based on Frequency Reuse, that involves the partitioning of an RF radiation area into cell SEGMENTS.
  • A frequency that is far ENOUGH AWAY from the frequency in the bordering segment is used by one segment of the cell.
  • Similar frequency is used at least two cells apart from each other.
  • This practice enables various cellular providers to have several customers for a given SITE license. 

Frequency Re-use:

4.

Explain Channel Coding?

Answer»

CHANNEL coding :

  • The data rate for the radio channel is 270 kbps.
  • The data rate is split into 8 full rate or 16 half rate traffic channels, along with signaling channels
  • In order to have the maximum chance for DETECTING and correcting errors, the code is complex in a typical propagation path
  • Forward Error Correction is applied in order to get the speech coder encryption, coding and interleaving in a sophisticated way
  • The data is sent as bursts in 577 mus time slots. Each contains 116 ENCRYPTED bits
  • Every TDMA frame consists of 8 or 16 time slots
  • Transmit time slots are staggered, so that at some instant the mobile station will not receive the same instants while transmitting, which enables the simplifying the filtering requirements
  • At LEAST one spare slot between transmit and receive is available with this scheme.

Channel coding :

5.

Explain Interleaving?

Answer»

Interleaving: 

  • Time diversity in a signal communication SYSTEM is obtained by using Interleaving.
  • The possibility of losing whole bursts will be decreased by interleaving.
  • TOTAL 456 bits from convolution ENCODER, including 20ms of speech, is subdivided into eight blocks. Each block consists of 57 bits.
  • All these blocks are transmitted in consecutive time slots.
  • Enough information is available in 7 blocks, in case one of the blocks is lost due to burst errors. This enables whole segment recovery by using error CORRECTION.

Interleaving: 

6.

Explain Equalisation?

Answer»

 EQUALISATION

  • An adaptive EQUALIZER is employed by a GSM receiver for OVERCOMING the impact of non-ideal channel characteristics which are caused by multipath propagation.
  • Adaptive equalizer is required because the channel characteristics are often changing FAST.
  • Tuning the for each TIME slot is done by the equalizer.

 Equalisation: 

7.

Which Uplink/ Downlink Spectrum Is Allocated To Following? A.) Gsm – 900 B.) Dcs – 1800

Answer»

GSM – 900: Uplink spectrum is 890.2–914.8 and DOWNLINK spectrum is 935.2–959.8

DCS – 1800: Uplink spectrum is 1710.2–1784.8, and downlink spectrum is 1805.2–1879.8

GSM – 900: Uplink spectrum is 890.2–914.8 and downlink spectrum is 935.2–959.8

DCS – 1800: Uplink spectrum is 1710.2–1784.8, and downlink spectrum is 1805.2–1879.8

8.

Explain The Following Techniques In Gsm: A.) Sectorization Of A Cell B.) Frequency Re-use C.) Transmitted Power Control D.) Discontinuous Transmission

Answer»

 Sectorization of a cell : 

  • Sectorization is a process to cut down equipment costs in a cellular network. It influences in traffic load and cell size
  • Sectorization reduces co-channel interference, when applied to clusters of cells
  • The maximum traffic capacity of sectored ANTENNAS is more than omnidirectional antennas.

Frequency Re-use :

  • Frequency re-use is the key factor of cellular network ability for increasing both coverage and capacity.
  • Different frequencies are utilized by adjacent cells; however problem does not arise to determine the cell sufficiently far apart using the same frequency.
  • Reuse distance and the reuse factor are the two ELEMENTS that influence frequency reusability
  • The frequency is 1/K, where K is the number of cells that cannot use the same frequencies for transmission.

TRANSMITTED Power Control :

  • Transmitted power control is one of the technical mechanism used within some networking devices
  • TPC is used for preventing too much unwanted interference among wireless networks
  • The central idea is to automatically REDUCE the transmission OUTPUT power used, when other networks are within the same range.
  • TPC reduces interference problems and increases the battery capacity
  • The power levels of a single mobile device can be reduced by 6dB

Discontinuous Transmission : 

  • Discontinuous Transmission, also known as DTX in short is a method of momentarily powering down a mobile set when there is no voice input to the set.
  • The overall efficiency of a wireless voice communication system is optimized by DTX.
  • Each speaker in a two way conversation speaks slightly less than half of the time.
  • The workload of the components in the transmitter amplifiers are made easy and reduces interference. 

 Sectorization of a cell : 

Frequency Re-use :

Transmitted Power Control :

Discontinuous Transmission : 

9.

Explain The Services Offered By Gsm.

Answer»
  • The services offered by GSM are ISDN compatible
  • GSM allows synchronous data and ASYNCHRONOUS data to be transported as bearer service, ONE of the telecommunication services offered by GSM, and forms ISDN terminal
  • The data could be either transparent service or nontransparent service
  • Telephony is one of the services offered by GSM, which an emergency and the service provider is notified by dialing 3 digits
  • By using appropriate fax adaptor, G3 fax service is supported
  • One of the features of GSM is Short Messaging Service
  • Certain services, NAMELY supplementary services are provided on TOP of teleservices or bearer services by GSM, such as, caller identification, call forwarding, multiparty conversations, barring outgoing calls and call waiting.

10.

Explain The Following Two Types Of Hand Off In Cdma System: A.) Soft Handoff B.) Softer Handoff

Answer»

Soft handoff : 

  • Soft handoff is a feature in which a cellular phone is simultaneously connected to two or more cellular phones during a single call
  • It is he overlapping of repeater coverage ones, which enables every cell phone set is always well within the range of a specific repeater.
  • More than one repeater can send and receive signals to transmit signals to and from mobiles.
  • All repeaters are used with the same frequency channel for each mobile phone set.
  • Practically no dead ZONES and as result, the connections seldom interrupted or dropped. 

Softer handoff : 

  • Softer handover is a significant soft handover in which the added and removed links belong to the same node.
  • MACRO diversity with maximum ratio COMBINING could be performed in the same node.
  • The MOVEMENT of handoff, when a user can be served in another cell more efficiently (less power emission, less interference), is the most obvious cause for better PERFORMANCE.

Soft handoff : 

Softer handoff : 

11.

Explain Following Forward Link Channels In Cdma System: A.) Pilot Channel B.) Sync. Channel

Answer»

Pilot Channel : 

  • A forward link channel which is a base to mobile that modulates only by the pilot PN. It spreads common codes to all SIGNALS transmitted from a given base station.
  • Several critical important functions are provided by the pilot channel for forward links in IS-95 systems
  • The pilot channel modulation FACILITATES the process of time synchronized replica generation at the receiver of the PN spreading sequences. These are utilized at the transmitter for modulating the synchronization, paging and traffic channels. These are transmitted from the same base station.

Sync-Channel :

  • A base station transmits a Sync-Channel that spreads with Walsh code 32.
  • The frame of synch channel is 80/3ms long with frame boundary is aligned to the pilot.
  • Sync channel transmits a single MESSAGE continually, called Sync Channel Message.
  • The Sync Channel Message contains network information, including the PN offset that is used by the Base Station sector.
  • The length and content of the message is dependent on the P_REV.
  • The message transmission rate is 32 bits / frame.
  • The message is encoded to 128 symbols
  • The message yielding rate is 1200 bits / s.

Pilot Channel : 

Sync-Channel :

12.

What Is The Difference Between Cdma And Gprs? Which Of Them Is Better? Why?

Answer»

The Differences:

  • CDMA is one of the types of mobile connections for making calls where as GPRS is a technology for internet connections through a mobile phone.
  • GPRS enables to SURF the internet from a mobile phone. GPRS technology is USED in other gadgets APART from mobile phones.
  • W-CDMA technology is faster than GPRS, since the user cares about the technology that is applied for air interface.
  • Average latency on GPRS is AROUND 1.3 seconds, where as on CDMA is around 400 milli second
  • GPRS supports only User Datagram Protocol, where as CDMA supports both UDP and TCP
  • GPRS relies on Network Address Translation and a private IP address is assigned to it. On the other hand CDMA assigns a public IP address CDMA is better because:
  • E-mail is pretty light, until you enter MS-Office.
  • Pocket PC’s support for office documents with similar functionality which can be had on Palm OS and Symbian
  • Upon availability of APIs, a software developer could write various applications, like voice transfer, data transfer to CLIENT’s account, integrating billing amount etc.
  • Web services could be utilized.

The Differences:

13.

What Are The Difference Between Tdma?

Answer»

CDMA and TDMA : 

CDMA 

  • Power limited system
  • While people talking, random noise band playing occurs
  • CONVERSATION need to be extracted from the background din
  • GP is high when people SPEAK different languages, which is easier to DISTINGUISH individual speakers
  • It is difficult for distinguishing individuals, when GP is low.
  • The system performance will be degraded for every user when the number of users increases.
  • Fading would be reduced with wide frequency spectrum
  • Need to have separate multipath signals with different delays by “chip” unit.

TDMA : 

  • Receiving or TRANSMISSION is allowed for only one user in a given slot
  • All slots are assigned cyclically
  • The transmission is non-continuous
  • It is essential to use digital data and modulation
  • Data rate overhead is between 20% – 30%
  • Overhead tradeoffs are size of data payload and latency
  • Multiple users are shared with single carrier frequency
  • Handoff is made simpler by using non-continuous transmission
  • All slots are assigned on demand
  • Due to reduced inter user interference, the power control is less stringent.

CDMA and TDMA : 

CDMA 

TDMA : 

14.

What Is The Differentiate Between Cdma And Fdma ?

Answer»

CDMA and FDMA 

CDMA : 

  • Same frequency is used by every user and simultaneous transmission occurs
  • Every narrowband signal is multiplied by wideband spreading signal, usually KNOWN as codeword
  • Every user has a separate pseudo-codeword, i.e., orthogonal to others
  • Only the desired codeword is detected by the receivers and others appear as NOISE
  • It is MANDATORY for the receivers to know about the transmitter’s codeword

FDMA :

  • When the channel is not in use, it sits simply idle.
  • Bandwidth of Channel is relatively narrow (30 KHz), known as narrowband system.
  • Little or no equalization is NEEDED for spreading symbol time.
  • Analog links are suitable for FDMA.
  • Framing or synchronization bits are not needed for CONTINUOUS transmission.
  • Tight filtering is needed to minimize interference.

CDMA and FDMA 

CDMA : 

FDMA :

15.

What Is The Importance Of Cdma In Today’s Cellular World?

Answer»
  • The TRANSITION to digital RADIO through the process of DEFINING standards is implementing about 90% in the CELLULAR industry.
  • SMOOTH transition to digital standards is involved in CDMA technology.
  • Most often, it can be viewed as improved and replacement technology of TDMA
  • Moving towards 4G technology is compatible with CDMA technology.

16.

What Is The Difference Between Cdma And Gsm?

Answer»

The important differences are:

DATA Transfer Speed:

  • CDMA is faster than GSM.
  • CDMA2000 downstream rate is 2 megabits / second, through EVDO, where GSM downstream rate is up to 384 kilobits / second, through EDGE technology

Subscriber Identity Module (SIM) cards:

  • SIM is tied to the network, rather than the actual phone. Phones with card-enabled can be used with any CARRIER of GSM
  • Proprietary handsets are linked to one carrier only and not card-enabled in CDMA

Roaming:

  •  GSM carriers have wider coverage of more RURAL AREAS, where as CDMA may not cover rural areas compared to GSM carriers

International Roaming:

  • GSM has facility to OFFER more international roaming, as the number of connections in world market dominate GSM network.
  • CDMA phones do not have the capacity; however, there are more countries that use CDMA networks.

The important differences are:

Data Transfer Speed:

Subscriber Identity Module (SIM) cards:

Roaming:

International Roaming:

17.

Explain Ev-do/ Evdo?

Answer»
  • EVDO stands for Evolution Data Optimized
  • EVDO is a 3G broadband technology used by VERIZON, Spring, Alltel
  • It provides TYPICAL download speeds of 600 to 1400 KBPS
  • A personal broadband service for wide range of customers
  • It is always On
  • EVDO utilizes CDMA signals
  • Users can be CONNECTED remotely for using email, downloading large files, spreadsheets etc.
  • EVDO is relatively low cost with high capacity
  • Allows rich web browsing and application USAGE
  • Seamless roaming, internal internet connectivity without relying on other’s connection, accessibility to the corporate Virtual Private NETWORK by customers are some of the advantages over WiFi.

18.

Explain Dect?

Answer»
  • DECT is one of the wireless technologies, originated in Europe
  • DECT was designed to interwork with VARIOUS networks such as PSTN, ISDN, GSM etc.
  • The initial standard. of DECT focused on developing air interface which is a radio link between cordless telephone and the base stations
  • This standard plugged into the telephone socket and the standard PROTOCOLS for handover between several base stations
  • All these are connected to the same office switchboard, typically a PABX
  • The first PRODUCT of its kind was from Olivetti, was a wireless LAN type product, known as NET3.

19.

Explain Edge?

Answer»
  • EDGE is an acronym for Enhanced Data GSM Environment
  • An improved wireless technology over GSM
  • A 2nd GENERATION cell phone technology
  • EDGE is used for wireless data transfer via MOBILE phone connection
  • Data transfer rates up to 4 times more than GSM NETWORKS
  • With the advent of Blackberry and iPhone, faster data transfer is sought
  • Using more sophisticated coding, usually without high END hardware, wireless carrier’s base stations are supported for data transfer speeds up to 384 KBPS
  • EDGE is an ALTERNATIVE to replacing wireless technology, such as GPRS
  • EDGE will eventually be replaced by 3G technology such as WCDMA.

20.

Explain Cdma One And Cdma2000?

Answer»

CDMA One : 

  • CDMA one refers original ITU IS-95 CDMA wireless interface protocol. It is considered as a 2G mobile wireless technology
  • The version IS-95A protocol EMPLOYS a 1.25 Mhz CARRIER and data speeds up to 14.4 Kbps
  • The version IS-95B support data speeds up to 115 kbps by employing 800 MHz / 1.9 GHz.

CDMA2000 :

  • Also known as IMT Multi-Carrier, a family of 3G mobile technology standards.
  • USED for sending voice, data and signaling between cell sites and mobile pones
  • The standards such as CDMA2000 1X, CDMA2000 EV-DO Rev. 0, are approved radio INTERFACES for ITU IMT-2000
  • CDMA 2000 is backward compatible with its previous 2G iteration IS-95

CDMA One : 

CDMA2000 :

21.

What Is Cdma? Explain The Technology.

Answer»
  • CDMA stands for Code Division Multiple Access
  • CDMA is a wireless technology used in transmission of signal from places with HIGH Security and noise REDUCTION.
  • The principle of Spread Spectrum is used to work with CDMA.
  • Spread signal is below the noise level noise and has no effect on the signal.
  • CDMA does not frequency specific to each user. Instead, every channel uses the full available spectrum.
  • Individual conversations are encoded with a pseudo-random digital sequence.
  • CDMA always provides BETTER capacity for voice and data communications
  • CDMA is a common platform for 3G technologies
  • ANALOG radio transmission technologies like Advanced Mobile Phone SYSTEM were used in CDMA at the time of its inception
  • A unique code is received by all mobile network users and is allowed continuous network access instead of intermittent and timed access.

22.

What Is Cdma2000?

Answer»
  • CDMA2000 is a Multi-carrier code-division multiple access version of IMT-2000 standard
  • CDMA2000 is a 3G wireless technology.
  • World’s first 3G commercial system was LAUNCHED by SK Telecom of South KOREA using CDMA2000 1X
  • CDMA 2000 supports MOBILE data COMMUNICATIONS at speeds from 144KBPS to 3MBPS
  • The versions of CDMA2000 have been developed by Qualcomm and Ericsson
  • There were 250,300,000 SUBSCRIBES world for CDMA by March 2006.

23.

What Is International Telecommunications Union And What Are Its Functions?

Answer»
  • ITU is an intergovernmental organization
  • Telecommunications are developed by using ITU by public and private organizations.
  • ITU is RESPONSIBLE for adopting regulations, INTERNATIONAL treaties and standards that governs telecommunications

Functions of International Telecommunications Union:

    • MAINTAINING and extending the international cooperation for the improvement
    • Rational usage of telecommunications, for promoting EFFICIENT use of technical facilities
    • To harmonize the ACTIONS of nations.

Functions of International Telecommunications Union:

24.

Explain Umts?

Answer»
  • UMTS STANDS for Universal Mobile Telecommunications Systems
  • One of the emerging mobile technologies for 3G mobile phones.
  • The main BENEFIT of UMTS is, undoubtedly, its speed
  • Current rates of broadband data transfer is 2MBits / second
  • The speed of UMTS makes it possible to stream VIDEO that supports movie DOWNLOADS and video conferencing.
  • In a nut shell, UMTS provides ALMOST all the facilities of a home computer system while on the move.
  • UMTS combines the technologies like wireless, satellite which provides seamless transitions between Wi-Fi and satellite.

25.

Explain Hlr (home Location Register) , Iden(integrated Digital Enhanced Network), I-appli ?

Answer»

HLR (Home Location Register) :

  • For GSM and CDMA wireless networks
  • It’s responsibility is to authenticate and AUTHORIZE subscribers and their services.

iDEN (Integrated Digital Enhanced Network) : 

  • A wireless technology for Motorola
  • It has the capabilities of digi-cellular phone, 2 way radio, alphanumeric pager and data modem / fax modem in a single network
  • Operational bands are 800 MHZ, 900 MHz and 1.5 GHz
  • iDEN is based on TDMA (Time Division Multiple Access) and GSM architecture
  • For voice compression it uses Motorola’s Vector Sum Excited Linear Predictors vocoder.
  • For delivering 64KBPS over a 25 KHz channel, it uses QAM modulation.
  • iDEN is designed to serve the mobile user for accessing information quickly without carrying several devices.

i-appli : 

  • i-appli is a Java environment based on CLDC.
  • Handsets of NTT DoCoMos are UTILIZING i-appli
  • It is similar to MIDP, however both APIs are INCOMPATIBLE.

HLR (Home Location Register) :

iDEN (Integrated Digital Enhanced Network) : 

i-appli : 

26.

Explain Gprs ( General Packet Radio Service)?

Answer»

GPRS ( General Packet Radio Service) : 

  • Packet oriented mobile data service available to the USERS of 2G cellular SYSTEMS.
  • It is global system for communicating through mobile phones using GSM as well as in 3G systems.
  • GPRS data transfer is charged per MB of traffic TRANSFERRED, where as in circuit switching, data transfer is charged per minute of connection TIME
  • GPRS is better packet switching service, as opposed to circuit switching.
  • 2G cellular systems are combined with GPRS and known as 2.5G.
  • Provides moderate speed data transfer by using unused TDMA channels, such as GSM.

GPRS ( General Packet Radio Service) : 

27.

How Is 3g Different From 2g?

Answer»
  • Packet DATA speed is HIGHER in 3G, and it is up to 384 KBPS
  • Voice and SMS speed is ALSO 384 KBPS in 3G
  • 2G utilizes different switching techniques for voice and data, where as 3G uses single switching, irrespective of data
  • 3G has at least 2MB of data link of a mobile, where in 2G the data rate is in KBPS
  • 3G has WiMAX facility for faster VOIP and internet
  • 2G uses GSM TDMA technology with narrowband 200Khz.
  • 3G uses CDMA technology with broadband 5Mhz, with same frequency carrier and time.

28.

What Are The Advantages And Disadvantages Of 3g?

Answer»

Advantages of 3G:

  • Overcrowding is relieved in existing systems with radio spectrum
  • Bandwidth, security and reliability are more
  • Provides interoperability among service providers
  • AVAILABILITY of fixed and variable rates
  • Support to DEVICES with backward compatibility with existing networks
  • Always online devices – 3G uses IP connectivity which is packet based
  • Rich multi media services are available

Disadvantages of 3G:

  • The cost of cellular infrastructure , upgrading base stations is very high
  • Needs different handsets.
  • Roaming and data/voice work together has not yet been implemented
  • Power consumption is high
  • Requires closer base stations and are expensive
  • Spectrum-license COSTS, network deployment costs and handset subsidies SUBSCRIBERS are tremendous.

Advantages of 3G:

Disadvantages of 3G:

29.

What Are 3g Standards?

Answer»

3G standards:

UMTS:

  • Universal Mobile Telecommunications System – One of the 3G mobile telecommunications technologies, ALSO being developed into a 4G technology.
  • Most common form of UMTS uses W-CDMA as an underlying AIR interface.
  • UMTS also covers Radio ACCESS NETWORK – UMTS Terrestrial Radio Access Network (UTRAN), and Mobile Application Part (MAP).
  • Users are authenticated via USIM cards (Universal Subscriber Identity Module).

CDMA2000

  • Also known as IMT Multi-Carrier (IMT-MC), uses CDMA channel access for sending voice, data and signaling data between mobile phones and cell sites.
  • The standards are CDMA2000 IX, CDMA2000 EV-DOR Rev.0, CDMA2000 EV-DO Rev.A and CDMA2000 EV-Rev.B. They are approved radio interfaces for the ITU’s IMT-2000.

3G standards:

UMTS:

CDMA2000

30.

What Is 3g?

Answer»

Definition: 3G, known as 3RD Generation, is a standard for mobile / cellular phones. It provides the services that FULFILL the International Telecommunication Union specifications.

The application services of 3G include wireless voice telephone, mobile internet access, video calls and mobile television – all in a mobile environment.

  • 3G ALLOWS simultaneous use of speech and data services
  • 3G provides peak data RATES of at least 200 KBits according to the IMT-2000 SPECIFICATION.
  • Mobile broadband access of several MBits to laptop computer systems, smart phones is provided by latest 3.5G, 3.75G versions.

Definition: 3G, known as 3rd Generation, is a standard for mobile / cellular phones. It provides the services that fulfill the International Telecommunication Union specifications.

The application services of 3G include wireless voice telephone, mobile internet access, video calls and mobile television – all in a mobile environment.

31.

What Does Fec Mean In Bluetooth?

Answer»
  • FEC stands for Forward Error Correction. On the data payload, FEC reducing the number of retransmissions.
  • Within blue tooth, there are 2 VERSIONS namely, 1/3 FEC and 2/3 FEC. 
  • The 1/3 VERSION is 3 times repetition of each information bit. 
  • The 2/3 version is a shortened Hamming code. 
  • It is known as a method of obtaining error control in data transmission in which the source sends redundant data and the destination will recognize it without the errors.
  • They are used for broadcasting to many DESTINATIONS from a SINGLE source.

32.

Explain The Term 'airport' In Bluetooth?

Answer»

Airport is standard (802.11) and has a FASTER transfer rate. Technologically it is more ADVANCED, more rugged and smaller and CAPABLE of being used anywhere. It is 10mb/sec, 50 meters, 10 active devices. Apparently, Bluetooth is 1mb/sec, 10 meters and 7 active devices.

Airport is standard (802.11) and has a faster transfer rate. Technologically it is more advanced, more rugged and smaller and capable of being used anywhere. It is 10mb/sec, 50 meters, 10 active devices. Apparently, Bluetooth is 1mb/sec, 10 meters and 7 active devices.

33.

What Are The Technical Characteristics Of Bluetooth?

Answer»

The following are the technical characters of a Bluetooth device:

The devices are either a one chip solution or multiple chips in general. Blue tooth device has three main parts – RF, baseband processor and link manager (COULD be a CPU core like 8 or 16 bit REDUCED Instruction SET Computer. A BT module in multiple chips, usually 2 or 3 chip, like RF on a chip are produced by certain vendors.

For a single chip solution, the following information can be used for referencing from a particular vendor.

  • Package : 81 ball BGA, 8mm x 8mm
  • Supply Voltage : 2.7 – 3.3v
  • Power Consumption : Data transmitting @ 4dBm – type 41mA
  • Voice Only Connection : 15mA for HV3 packets, 30mA for HV1
  • RI Page Scanning : 420uA
  • Inquiry Scanning + RI Page Scanning : 560uA
  • Park mode (1 second interval) : 120uA
  • Standby state : 10uA

The components, the chip, memory and the crystal, antenna could be placed on a PCB about 20mm x 15mm. The thickness of the chip is about 1.25mm or 1.55 mm..

The following are the technical characters of a Bluetooth device:

The devices are either a one chip solution or multiple chips in general. Blue tooth device has three main parts – RF, baseband processor and link manager (could be a CPU core like 8 or 16 bit Reduced Instruction Set Computer. A BT module in multiple chips, usually 2 or 3 chip, like RF on a chip are produced by certain vendors.

For a single chip solution, the following information can be used for referencing from a particular vendor.

The components, the chip, memory and the crystal, antenna could be placed on a PCB about 20mm x 15mm. The thickness of the chip is about 1.25mm or 1.55 mm..

34.

Explain The Modulation Techniques Used In Bluetooth Technology?

Answer»

Blue tooth uses FREQUENCY HOPPING Spread SPECTRUM technique which is used in spread spectrum signal transmission. During radio transmission, frequencies are switched repeatedly, to help reducing unlawful access to cross paths which causes interruptions. FHSS makes BLUETOOTH communication more robust and secure. The speed of interferences from other devices will be reduced, though it will not cause the transmission to stop. 
Adaptive modulation and coding methods, OFDM, GMSK, QAM, CDMA, DMT and similar methods are utilized in the areas of wireless, cellular and satellite communication systems. These modulations are used in wireless, cellular, wired line and satellite communication systems.

New technologies such as MIMO, BLAST and space-time coding are used in transmission data communication systems.

Blue tooth uses Frequency Hopping Spread Spectrum technique which is used in spread spectrum signal transmission. During radio transmission, frequencies are switched repeatedly, to help reducing unlawful access to cross paths which causes interruptions. FHSS makes Bluetooth communication more robust and secure. The speed of interferences from other devices will be reduced, though it will not cause the transmission to stop. 
Adaptive modulation and coding methods, OFDM, GMSK, QAM, CDMA, DMT and similar methods are utilized in the areas of wireless, cellular and satellite communication systems. These modulations are used in wireless, cellular, wired line and satellite communication systems.

New technologies such as MIMO, BLAST and space-time coding are used in transmission data communication systems.

35.

What Is The Signal Strength Transmitted By Cell Phones?

Answer»

The magnitude of the ELECTRIC field at a reference point, which is SIGNIFICANT distance from the transmitting ANTENNA, is KNOWN as signal strength. Signal strength is expressed in voltage/length or signal power received by the antenna. In mobile phones, the signal strength is usually expressed in dB-microvolts per meter or in decibels above a reference level of ONE milliwatt.

The magnitude of the electric field at a reference point, which is significant distance from the transmitting antenna, is known as signal strength. Signal strength is expressed in voltage/length or signal power received by the antenna. In mobile phones, the signal strength is usually expressed in dB-microvolts per meter or in decibels above a reference level of one milliwatt.

36.

Which Technology Is Used To Avoid Interference In Bluetooth?

Answer»

Blue tooth uses frequency hopping TECHNOLOGY. In this technology, 79 hop frequencies are transmitted and received from 2402 to 2480 mhz. hopping in a pseudo random sequence at a rate of 1600 times in a second. Guassian frequency shift keying MODULATION is utilized with a maximum data transfer rate of 721 kbps. Bluetooth protocol stack is developed and TCP/IP imported LAYERS are used in this technology.

Interference is being avoided by utilizing the frequency-hop(FH) spread spectrum technology. It is ADAPTABLE for low-power, low-cost radio implementations and also used in certain wireless LAN products.

The major advantage with this technology transmission is the high rate of 1600 hops / ps. Another advantage is, short PACKET length is also used by Bluetooth.

Blue tooth uses frequency hopping technology. In this technology, 79 hop frequencies are transmitted and received from 2402 to 2480 mhz. hopping in a pseudo random sequence at a rate of 1600 times in a second. Guassian frequency shift keying modulation is utilized with a maximum data transfer rate of 721 kbps. Bluetooth protocol stack is developed and TCP/IP imported layers are used in this technology.

Interference is being avoided by utilizing the frequency-hop(FH) spread spectrum technology. It is adaptable for low-power, low-cost radio implementations and also used in certain wireless LAN products.

The major advantage with this technology transmission is the high rate of 1600 hops / ps. Another advantage is, short packet length is also used by Bluetooth.

37.

What Is Rj-45?

Answer»
  • RJ-45 STANDS for Registered Jack – 45.
  • It is an 8-wire connector for connecting computer systems on to a LAN, especially ETHERNETS.
  • These connections are similar in appearance to the ubiquitous RJ-11, which are used in connecting telephone equipment, with LITTLE more width. 
  • It is one of the most commonly used connectors.
  • Two wiring schemes like T568A and T568B are used to terminate the twisted-pair cable to the connector INTERFACE.
  • They LOOK similar to the RJ-11 connectors which are used for connecting the telephone equipments but are wider then them.

38.

What Is Meant By The Term 'ip Spoofing'?

Answer»

IP Spoofing: Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a TRUSTED host, for gaining unauthorized access to computer systems. The hacker / intruder FIRST utilize a variety of techniques for FINDING an IP address of a trusted host. Later he MODIFIES the packet headers, in order to give an illusion that the packets are sent from the host.

IP Spoofing: Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a trusted host, for gaining unauthorized access to computer systems. The hacker / intruder first utilize a variety of techniques for finding an IP address of a trusted host. Later he modifies the packet headers, in order to give an illusion that the packets are sent from the host.

39.

List Out The Differences Between Udp And Tcp?

Answer»
  • TCP is connection oriented protocol, where as UDP is connection LESS protocol.
  • In TCP, information is sent after establishing the connection from client to server, where as data is sent in chunks in UDP.
  • TCP is reliable – UNLESS the connection fails completely, the message will be reached to the destination.
  • UDP is unreliable – there are chances to lose the data sent on the way.
  • TCP is an ordered protocol – when messages are sent one after other, the first message will be received first.
  • UDP is an unordered protocol – when TWO messages are sent, the order of their arrival at the destination is unknown.

40.

Explain The Following Terms: Icmp, Arp, Multicast, Broadcast

Answer»
  • Internet Control MESSAGE Protocol: This protocol is used for while checking the connectivity USING ping command
  • Address Resolution Protocol: This protocol is used to know about the properties of TCP/IP. For example, to know other system MAC addresses.
  • Multicast: Communication between single sender and a list of select recipients in a NETWORK.
  • Broadcast: To SEND MESSAGES to all the recipients simultaneously in a network.

41.

Explain The Working Of Trace Route?

Answer»

Trace route works by increasing the time-to-live value of every SUCCESSIVE packets sent in batch. Every three packets that were sent first, have a time-to-live value 1. The next three packets have a TTL value of 2 and so on. The host decrements the TTL value by one and the packet is FORWARDED to the next host, when a packet passes through a host.

When a packet (with a time-to-live value of 1) reaches a host, the packets will be discarded by the host, and an ICMP time exceeded packet is sent to the sender. A list of HOSTS, whose packets have traversed enrouted to the destination, is utilized by the trace route utility.

Trace route works by increasing the time-to-live value of every successive packets sent in batch. Every three packets that were sent first, have a time-to-live value 1. The next three packets have a TTL value of 2 and so on. The host decrements the TTL value by one and the packet is forwarded to the next host, when a packet passes through a host.

When a packet (with a time-to-live value of 1) reaches a host, the packets will be discarded by the host, and an ICMP time exceeded packet is sent to the sender. A list of hosts, whose packets have traversed enrouted to the destination, is utilized by the trace route utility.

42.

Explain About Tcp Flow Control?

Answer»

TCP utilizes a flow control protocol from one end to another end for AVOIDING the sender to SEND data too quickly for the TCP receiver to receive and process it in a reliable manner. Machines of DIVERSE network can communicate quickly by having the flow control mechanism.

TCP utilizes a sliding window flow control protocol. In every TCP segment, the receiver is specified in a receive window field, the additional received data that is to buffer for the connection. When a window of size 0 is advertised by a receiver, the data sending is stopped by the sender and starts the persist timer. The TCP dead lock situation is PROTECTED by the persist timer. The TCP sender sends the packet and the receiver sends the acknowledgement with the new size of window, at the TIME of expiring the persist timer.

TCP utilizes a flow control protocol from one end to another end for avoiding the sender to send data too quickly for the TCP receiver to receive and process it in a reliable manner. Machines of diverse network can communicate quickly by having the flow control mechanism.

TCP utilizes a sliding window flow control protocol. In every TCP segment, the receiver is specified in a receive window field, the additional received data that is to buffer for the connection. When a window of size 0 is advertised by a receiver, the data sending is stopped by the sender and starts the persist timer. The TCP dead lock situation is protected by the persist timer. The TCP sender sends the packet and the receiver sends the acknowledgement with the new size of window, at the time of expiring the persist timer.

43.

Bluetooth Is Called A Cable Replacement Technology. Explain.

Answer»
  • Bluetooth allows Personal Area NETWORKS without the cables.
  • It provides connectivity to many mobiles users at a time for SHARING without wires. 
  • Bluetooth CHIP is designed for replacing cables by transmitting the information at a special frequency from sender to receiver. 
  • Bluetooth is an INEXPENSIVE,low-power, short range radio based technology.
  • Cabling involves a lot of cost foe execution.
  • Bluetooth is much more flexible and robust than cabling.
  • They even REQUIRE a very low bandwidth of data transfer.

44.

What Is Bluetooth?

Answer»
  • Bluetooth is a wireless technology standard used to exchange DATA over short DISTANCES.
  • The data is exchanged from FIXED and mobile devices by creating Personal Area Network with security at high level. 
  • Bluetooth was originally conceived as a wireless alternate to RS-232 cables. 
  • It resolves the PROBLEMS synchronization by connecting several devices. 
  • It requires a low-cost transceiver CHIP that needs to be included in all the devices.
  • The connections can be point to point or multipoint.
  • A built in verification and encryption is also provided.