Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question 1 Frequency reuse concept is used in

a. FDMA and TDMA systems

b. TDMA and CDMA systems

c. CDMA and FDMA systems

d. all of the above

Question 2 Performance measures of call admission control include

a. new call blocking probability

b. new call arrival rate

c. handoff rate

d. none of the above

Question 3 Mobility management covers

a. handoff management and power management

b. power management and location management

c. location management and handoff management

d. none of the above

Question 4 Performance metrics of handoff designs include

a. new call blocking probability, handoff call blocking probability and handoff rate

b. call dropping probability, handoff call blocking probability and successful call duration

c. call dropping probability, new call blocking probability and successful call duration

d. call dropping probability, handoff rate and successful call duration

Question 5 There are several handoff types

a. In hard handoff, a CDMA MS connects to two or more BS's at a given time

b. In a two-way softer handoff, a CDMA MS connects to two BS's

c. In soft handoff, a TDMA MS connects to two or more BS's

d. none of the above statements is correct

Question 6 Paging messages are sent from BS to MS

a. To minimize delay, cells are divided into groups and page one group at a time

b. To minimize paging traffic, page all cells at the same time

c. To minimize paging traffic, MS should send less frequent location updates

d. none of the above statements is correct

Question 7 HLR and VLR

a. Most of subscriber information are found in VLR

b. Paging areas are determined by the location of HLR rather than the location of VLR

c. To deliver a call to a MS, signaling message goes to HLR first then VLR

d. none of the above statements is correct

Question 8 In wireless multiple access,

a. collision avoidance is preferred rather than collision detection

b. collision detection is preferred rather than collision avoidance

c. both collision avoidance and collision detection are important

d. neither collision avoidance and collision detection can be implemented

Question 9 In a wireless network, a TCP packet can be lost due to

a. wireless channel errors

b. network congestion

c. handoff delay

d. all of the above

Question 10 To handle packet routing, the following information is required

a. network topology

b. network traffic status

c. network link costs

d. all of the above

Question 11 In Mobile IP, each mobile

a. has a permanent IP address

b. has a temporary IP address associated with its visiting BS

c. uses the IP address of its home agent

d. uses both its home agent IP address and its foreign agent IP address

Question 12 Possible radio propagation mechanisms include

a. Line of sight

b. Reflection

c. Scattering

d. all of the above

Question 13 The following wireless TCP protocol is asymmetric over wireless link in terms of transmission power and bandwidth

a. I-TCP

b. AIRMAIL

c. SNOOP

d. none of the above

Question 14 3G wireless systems include

a. GSM and GPRS

b. GPRS and IS-95

c. IS-95 and cdma2000

d. cdma2000 and W-CDMA

Question 15 GSM and IS-95

a. GSM is based on FDMA and IS-95 is based on CDMA

b. GSM is based on TDMA and IS-95 is based on CDMA

c. GSM is based on FDMA and IS-95 is based on TDMA

d. GSM is based on TDMA and IS-95 is based on TDMA

Question 16 BSC

a. receives radio signals from MS's

b. transmits radio signals to MS's

c. performs radio channel allocation

d. acts as an agent for roaming MS's

Question 17 For modulation schemes,

a. GSM uses BPSK/QPSK and IS-95 uses GMSK

b. GSM uses GMSK and IS-95 uses BPSK/QPSK

c. GSM and IS-95 use BPSK/QPSK

d. GSM and IS-95 use GMSK

Question 18 The main purpose of power control in CDMA is to

a. minimize interference

b. save transmit power

c. enhance code orthogonality

d. none of the above

Question 19 For the three basic ARQ schemes

a. SW is more efficient than GBN

b. GBN is more efficient than SR

c. SR is more efficient than SW

d. none of the above statements is correct

Question 20 Duplexing versus multiple access

a. TDD and FDMA are used to accomplish the same task

b. TDD and TDMA are used to accomplish the same task

c. FDD and TDMA are used to accomplish the same task

d. none of the above statements is correct

Question 21 A wireless system can be noise-limited or interference-limited

a. Range-limited scenario is closely related to interference levels

b. Coverage-limited scenario is closely related to noise levels

c. Interference-limited scenario is closely related to noise levels

d. none of the above statements is correct

Question 22 In call admission control, guard channel scheme is introduced to

a. minimize handoff call dropping probability

b. minimize new call blocking probability

c. maximize channel utilization

d. all of the above

Question 23 For a given number of channels, to reduce the new call blocking probability,

a. the number of guard channels should be increased

b. the number of guard channels should be reduced

c. the number of guard channels is irrelevant

d. none of the above statements is correct

Question 24 Call dropping probability is calculated based on information such as

a. new call request failure due to lack of available channels

b. a call handoff to another cell

c. handoff call request failure due to lack of available channels

d. all of the above

Question 25 To achieve dynamic channel allocation,

a. channels can be shared within a cell

b. channels can be shared among different cells

c. channels can be shared among different clusters

d. none of the above statements is correct

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91522641
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Small java programcreate an int called num and initialize

Small Java Program: Create an int called num and initialize it to 5000. Create an int called reps and initialize it to 0. Use a for loop control structure that runs if num is greater than or equal to 250, subtracting 139 ...

Taylor found that 8 of the recipients of loans form a

Taylor found that 8% of the recipients of loans form a particular mortgage lender default within 3 years. If he takes a random sample of 736 customers who received loans 3 years ago, what is the average number of custome ...

Solve the problem by implementing the whole class with main

Solve the problem by implementing the whole class with main() function and demonstrate that your Java code can pass several appropriate test cases successfully in your main() function Suppose you have a stack S containin ...

Imagine you are employed by a large city police department

Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the c ...

Part 1 if false change the incorrect parts to make them

Part 1, If false, change the incorrect parts to make them true. DO NOT NEGATE THE FALSE SENTENCES. 1. According to the weak-form efficient market hypothesis, investors can take advantage of historical information. 2. The ...

Discuss the importance of using an access control model in

Discuss the importance of using an access control model in determining how employees in an organization should gain access to resources.

Question suppose we have a b-tree that holds keys and

Question : Suppose we have a B-Tree that holds keys and leaves. There are 100 million data records (N), and they are stored in the leaves (lowest level) of the B-Tree. Each leaf contains 100 data records. The leaves are ...

The contents of a particular bottle of shampoo marked as

The contents of a particular bottle of shampoo marked as 150 ml are found to be 153 ml at an average, with a standard deviation of 2.5 ml. What proportion of shampoo bottles contain less than the marked quantity? Assume ...

Question 1 war driving is a wireless attack describe at

Question: 1. War driving is a wireless attack. Describe at least four war driving tools and the purpose of each. Your response should be at least 150 words in length. 2. Name and describe the four major access control mo ...

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As