0% found this document useful (0 votes)
10 views4 pages

Assignment 5

The document contains a series of multiple-choice questions related to mobile communication concepts, including applications, protocols, and architectures. Key topics covered include GSM, Bluetooth, TCP, Mobile IP, and WAP. The questions test knowledge on various aspects of mobile communication technologies and their functionalities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views4 pages

Assignment 5

The document contains a series of multiple-choice questions related to mobile communication concepts, including applications, protocols, and architectures. Key topics covered include GSM, Bluetooth, TCP, Mobile IP, and WAP. The questions test knowledge on various aspects of mobile communication technologies and their functionalities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

IT605B (Mobile Communication)

Assignment V

Multiple choice questions

1) Which of the following is NOT a primary application of mobile communication?


a) Voice Communication
b) Data Transfer
c) Video Conferencing
d) Solar Energy Conversion
2) What does SDMA stand for in mobile communication?
a) Single Division Multiple Access
b) Spatial Division Multiple Access
c) Standard Division Multiple Access
d) Signal Division Multiple Access
3) In which of the following multiple access techniques does each user get a separate frequency
band?
a) TDMA
b) SDMA
c) FDMA
d) CDMA
4) Which of the following is an advantage of using TDMA (Time Division Multiple Access)?
a) Increased bandwidth usage
b) Higher data rates
c) Efficient spectrum usage
d) Less interference
5) What is the primary function of the GSM Mobile Station (MS)?
a) To manage network signaling
b) To provide access to the mobile network for users
c) To perform routing of data packets
d) To connect the user to the internet via GPRS
6) Which of the following is a key component of the GSM architecture?
a) Radio Access Network (RAN)
b) Home Location Register (HLR)
c) User Equipment (UE)
d) Universal Mobile Telecommunications System (UMTS)
7) In the context of GSM, what does the "BTS" stand for?
a) Base Transceiver Station
b) Base Terminal Station
c) Basic Transmission Service
d) Broad Transmission System
8) Which of the following is a key advantage of GPRS over GSM?
a) Increased data throughput for packet-switched services
b) Increased voice call capacity
c) Enhanced mobility management
d) Reduced network signaling overhead
9) Which of the following describes the main difference between IEEE 802.11a and IEEE 802.11b?
a) IEEE 802.11a operates at a lower frequency and has a longer range.
b) IEEE 802.11a operates at 5 GHz and offers higher data rates, while 802.11b operates at 2.4 GHz.
c) IEEE 802.11a uses TDMA, while 802.11b uses FDMA.
d) IEEE 802.11a supports Bluetooth devices, while 802.11b does not.
10) Which layer in the Bluetooth architecture is responsible for handling the physical transmission
of data?
a) Radio Layer
b) Baseband Layer
c) Link Manager Protocol (LMP)
d) Logical Link Control and Adaptation Protocol (L2CAP)
11) What is the role of the L2CAP (Logical Link Control and Adaptation Protocol) in Bluetooth?
a) It establishes physical communication channels.
b) It manages the Bluetooth security features.
c) It handles segmentation and reassembly of data packets.
d) It controls the frequency hopping mechanism.
12) Which of the following describes the purpose of TCP Slow Start?
a) It rapidly increases the window size to send more data
b) It gradually increases the window size to avoid network congestion
c) It decreases the window size when packet loss occurs
d) It prevents the sender from sending packets during congestion
13) Which of the following is a classical TCP improvement designed to work in mobile
environments?
a) Direct TCP
b) Indirect TCP
c) Standard TCP
d) New TCP
14) Which of the following is an optimization in Mobile IP to improve packet delivery efficiency?
a) Reverse tunneling
b) Extended registration
c) Use of multiple agents
d) Dynamic routing
15) What does frequency reuse in cellular systems allow?
a) The use of different frequencies in adjacent cells to avoid interference
b) The allocation of the same frequency to multiple cells in the same area
c) The use of the same frequency in different geographic areas with minimal interference
d) The elimination of frequency interference across all cells
16) What is the main purpose of location management in a cellular network?
a) To monitor the user's signal strength
b) To track the location of the mobile device for efficient call routing
c) To manage handoffs between cells
d) To allocate channels for call setups
17) Which of the following methods can be used to improve cell capacity and coverage?
a) Reducing the transmission power of the base stations
b) Using cell splitting to create smaller cells in high traffic areas
c) Implementing random frequency reuse across all cells
d) Increasing the number of users per channel
18) What is the primary function of the WAP Gateway in a wireless network?
a) To encrypt the communication between the client and the server
b) To convert wireless network protocols to standard internet protocols
c) To manage the mobile devices connected to the network
d) To provide direct access to the mobile internet without any protocol conversion
19) Which protocol is primarily used by WAP for communication between mobile devices and web
servers?
a) HTTP
b) WSP (Wireless Session Protocol)
c) TCP/IP
d) DNS (Domain Name System)
20) What is the primary challenge that WAP addresses in mobile networks?
a) Increasing the bandwidth for data transmission
b) Reducing the power consumption of mobile devices
c) Optimizing data transmission for devices with limited resources like bandwidth and processing power
d) Managing the security of mobile applications

You might also like