MCW MCQ
MCW MCQ
Which of the following is the world�s first cellular system to specify digital
modulation and network level architecture?
a) GSM
b) AMPS
c) CDMA
d) IS-54
answer A
4. Which of the following does not come under the teleservices of GSM?
a) Standard mobile telephony
b) Mobile originated traffic
c) Base originated traffic
d) Packet switched traffic
View Answer
Answer: d
Explanation: GSM services follow ISDN guidelines and are classified as either
teleservices or data services. Teleservices include standard mobile telephony and
mobile originated or base originated traffic.
5. Which of the following comes under supplementary ISDN services?
a) Emergency calling
b) Packet switched protocols
c) Call diversion
d) Standard mobile telephony
View Answer
Answer: c
Explanation: Supplementary ISDN services are digital in nature. They include call
diversion, closed user groups, and caller identification, and are not available in
analog mobile networks. Supplementary services also include short messaging service
(SMS).
6. Which of the following memory device stores information such as subscriber�s
identification number in GSM?
a) Register
b) Flip flop
c) SIM
d) SMS
View Answer
Answer: c
Explanation: SIM (subscriber identity module) is a memory device that stores
information such as the subscriber�s identification number, the networks and
countries where the subscriber is entitled to service, privacy keys, and other user
specific information.
7. Which of the following feature makes impossible to eavesdrop on GSM radio
transmission?
a) SIM
b) On the air privacy
c) SMS
d) Packet switched traffic
View Answer
Answer: b
Explanation: The on the air privacy feature of GSM makes impossible to eavesdrop on
a GSM radio transmission. The privacy is made possible by encrypting the digital
bit stream sent by a GSM transmitter, according to a specific secret cryptographic
key that is known only to the cellular carrier.
8. Which of the following does not come under subsystem of GSM architecture?
a) BSS
b) NSS
c) OSS
d) Channel
View Answer
Answer: d
Explanation: The GSM architecture consists of three major interconnected subsystems
that interact between themselves and with the users through certain network
interfaces. The subsystems are BSS (Base Station Subsystem), NSS (Network and
Switching Subsystem) and OSS (Operation Support Subsystem).
9. Which of the following subsystem provides radio transmission between mobile
station and MSC?
a) BSS
b) NSS
c) OSS
d) BSC
View Answer
Answer: a
Explanation: The BSS provides and manages radio transmission paths between the
mobile stations and the Mobile Switching Center (MSC). It also manages the radio
interface between the mobile stations and all other subsystems of GSM.
10. ___________ manages the switching function in GSM.
a) BSS
b) NSS
c) OSS
d) MSC
View Answer
Answer: b
Explanation: NSS (Network and Switching Subsystem) manages the switching functions
of the system. It allows the MSCs to communicate with other networks such as PSTN
and ISDN.
11. __________ supports the operation and maintenance of GSM.
a) BSS
b) NSS
c) OSS
d) MSC
View Answer
Answer: c
Answer: a
Explanation: Traffic channels carry digitally encoded user speech or user data. It
has identical functions and formats on both the forward and reverse links.
2. ____________ carries signalling and synchronizing commands.
a) Traffic channels
b) Control channels
c) Signalling channels
d) Forward channels
View Answer
Answer: b
Explanation: Control channels carry signalling and synchronizing commands between
the base station and mobile station. Certain types of control channels are defined
for just the forward or reverse link.
3. Which of the following is not a control channel of GSM?
a) BCH
b) CCCH
c) DCCH
d) TCH
View Answer
Answer: d
Explanation: There are three main control channels in the GSM system. These are the
broadcast channel (BCH), the common control channel (CCCH) and the dedicated
control channel (DCCH). Each control channel consists of several logical channels.
4. Which of the following is the forward control channel that is used to broadcast
information?
a) BCCH
b) CCCH
c) DCCH
d) TCH
View Answer
Answer: a
Explanation: The broadcast control channel (BCCH) is a forward channel that is used
to broadcast information such as cell and network identity, and operating
characteristics of the cell.
5. Which of the following channel does not come under CCCH?
a) PCH
b) RACH
c) DCCH
d) AGCH
View Answer
Answer: c
Explanation: CCCH consists of three different channels. They are paging channel
(PCH), which is a forward link channel, the random access channel (RACH) which is a
reverse link channel, and the access grant channel (AGCH) which is a forward link
channel.
6. Which of the following channel provides paging signals from base station to all
mobiles in the cell?
a) RACH
b) AGCH
c) DCCH
d) PCH
View Answer
Answer: d
Explanation: The PCH provides paging signals from the base station to all mobiles
in the cell. It notifies a specific mobile of an incoming call which originates
from the PSTN.
7. ___________ is a reverse link channel used by a subscriber unit to acknowledge.
a) RACH
b) AGCH
c) DCCH
d) PCH
View Answer
Answer: a
Explanation: The RACH (Random Access Channel) is a reverse link channel used by a
subscriber unit to acknowledge a page from the PCH. It is also used by mobiles to
originate a call.
8. Which of the following channel is used by base station to provide forward link
communication to mobile?
a) RACH
b) AGCH
c) DCCH
d) PCH
View Answer
Answer: b
Explanation: The AGCH (Access Grant Channel) is used by the base station to provide
forward link communication to the mobile. It carries data which instructs the
mobile to operate in a particular physical channel with particular dedicated
control channel.
9. Which of the following burst is used to broadcast the frequency and time
synchronization control messages?
a) FCCH and SCH
b) TCH and DCCH
c) RACH and TCH
d) FCCH and DCCH
View Answer
Answer: a
Explanation: FCCH and SCH burst are used to broadcast the frequency and time
synchronization control messages. They are used in TS0 of specific frames.
10. Which of the following burst is used to access service from any base station?
a) TCH
b) RACH
c) SCH
d) FCCH
View Answer
Answer: b
Explanation: Each user transmits a burst of data during the time slot assigned to
it. The RACH burst is used by all mobiles to access service from any base station,
and dummy burst is used as filter information for unused timeslots on forward link.
11. Group of superframes in GSM is called multiframe.
a) True
b) False
View Answer
Answer: b
1. US digital cellular system based on CDMA was standardized as ________
a) IS-54
b) IS-136
c) IS-95
d) IS-76
View Answer
Answer: c
Explanation: A US digital cellular system based on CDMA was standardized as Interim
Standard 95 (IS-95). It was standardized by US Telecommunication Industry
Association (TIA) and promised increased capacity.
2. IS-95 was not compatible with existing AMPS frequency band.
a) True
b) False
View Answer
Answer: b
Explanation: Like IS-136, IS-95 system was designed to be compatible with the
existing US analog cellular system (AMPS) frequency band. Hence, mobile and base
stations can be economically produced for dual mode operation.
3. Which of the following is used by IS-95?
a) DSSS
b) FHSS
c) THSS
d) Hybrid
View Answer
Answer: a
Explanation: IS-95 uses a direct sequence spread spectrum CDMA system. It allows
each user within a cell to use the same radio channel, and users in adjacent cell
also use the same radio channel.
4. Each IS-95 channel occupies ___________ of spectrum on each one way link.
a) 1.25 MHz
b) 1.25 kHz
c) 200 kHz
d) 125 kHz
View Answer
Answer: a
Explanation: To facilitate graceful transition from AMPS to CDMA, each IS-95
channel occupies 1.25 MHz of spectrum on each one way link, or 10% of the available
cellular spectrum for a US cellular provider.
5. IS-95 uses same modulation technique for forward and reverse channel.
a) True
b) False
View Answer
Answer: b
Explanation: IS-95 uses different modulation and spreading technique for the
forward and reverse links. On the forward link, the base station simultaneously
transmits the user data for all mobiles in the cell by using different spreading
sequence for each mobile.
6. IS-95 is specified for reverse link operation in _________ band.
a) 869-894 MHz
b) 849-894 MHz
c) 849-869 MHz
d) 824-849 MHz
View Answer
Answer: d
Explanation: IS-95 is specified for reverse link operation in the 824-849 MHz band
and 869-894 MHz for the forward link. The PCS version of IS-95 has also been
designed for international use in the 1800-2000 MHz bands.
7. User data in IS-95 is spread to a channel chip rate of ________
a) 1.2288 Mchip/s
b) 9.6 Mchip/s
c) 12.288 Mchip/s
d) 0.96 Mchip/s
View Answer
Answer: a
Explanation: User data is spread to a channel chip rate of 1.2288 Mchip/s (a total
spreading factor of 128) using a combination of techniques. The spreading process
is different for the forward and reverse links in the original CDMA specification.
8. __________ are used to resolve and combine multipath components.
a) Equalizer
b) Registers
c) RAKE receiver
d) Frequency divider
View Answer
Answer: c
Explanation: At both the base station and the subscriber, RAKE receivers are used
to resolve and combine multipath components, thereby reducing the degree of fading.
A RAKE receiver exploits the multipath time delays in a channel and combines the
delayed replicas of transmitted signal.
9. CT2 was the first generation of cordless telephones.
a) True
b) False
View Answer
Answer: b
Explanation: CT2 was the second generation of cordless telephones introduced in
Great Britain in 1989. It is used to provide telepoint services which allow a
subscriber to use CT2 handsets at a public telepoint.
10. CT2 is analog version of first generation cordless telephones.
a) True
b) False
View Answer
Answer: b
Answer: d
Explanation: The Digital European Cordless Telephone (DECT) is a universal cordless
telephone standard. It was developed by the European Telecommunications Standard
Institute (ETSI).
2. Which of the following is not true for DECT?
a) High traffic density
b) Long range telecommunication
c) Broad range of application
d) First pan European standard
View Answer
Answer: b
Explanation: DECT provides a cordless communication framework for high traffic
density, short range telecommunications. It covers a broad range of applications
and environments.
3. DECT can be used by users in an in-building PBX.
a) True
b) False
View Answer
Answer: a
Explanation: The main function of DECT is to provide local mobility to portable
users in an in-building Private Branch Exchange (PBX). It provides excellent
quality and services for voice and data applications.
4. The DECT system is based on __________ principles.
a) TCP
b) IP
c) OSI
d) AMPS
View Answer
Answer: c
Explanation: The DECT system is based on OSI (Open System Interconnection)
principles in a manner similar to ISDN. A control plane (C-plane) and a user plane
(U-plane) use the services provided by the lower layers.
5. Which of the following layer consists of paging channel and control channel?
a) Physical layer
b) Network layer
c) Data link layer
d) MAC layer
View Answer
Answer: d
Explanation: The MAC (Medium Access Control) layer consists of a paging channel and
a control channel for the transfer of signalling information to the C-plane. The U-
plane is served with channels for the transfer of user information.
6. Which of the following layer is responsible for providing reliable data links?
a) Physical layer
b) Network layer
c) Data link control layer
d) MAC layer
View Answer
Answer: c
Explanation: The DLC (data link control) layer is responsible for providing
reliable data links to the network layer. It divides up the logical and physical
channels into time slots for each user.
7. __________ is the main signalling layer of DECT.
a) Physical layer
b) Network layer
c) Data link layer
d) MAC layer
View Answer
Answer: b
Explanation: The network layer is the main signalling layer of DECT. It is based on
GSM and ISDN (layer 3) protocols. It provides call control and circuit switched
services selected from one of the DLC services.
8. Which of the following supports the physical layer of DECT common air interface?
a) Portable Handset
b) Network specific Interface Unit
c) Radio Fixed Part
d) Cordless controller
View Answer
Answer: c
Explanation: RFP (Radio Fixed Part) supports the physical layer of the DECT common
air interface. Every RFP covers one cell in the microcellular system. A full duplex
operation is achieved using TDD.
9. ________ supports the call completion facility in a multihandset environment.
a) Portable Handset
b) Network specific Interface Unit
c) Radio Fixed Part
d) Cordless controller
View Answer
Answer: b
Explanation: Network specific Interface Unit supports the call completion facility
in a multihandset environment. The interface recommended by the CCITT is the G.732
based on ISDN protocols.
10. __________ is a third generation Personal Communication System.
a) PACS
b) AMPS
c) IS-95
d) GSM
View Answer
Answer: a
Explanation: PACS (Personal Access Communication Systems) is a third generation
Personal Communication System. It was originally developed and proposed by Bellcore
in 1992.
11. _________ is also known as Japanese Digital Cellular.
a) PACS
b) AMPS
c) PDC
d) GSM
View Answer
Answer: c
1. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?
a) Application
b) Host to host
c) Internet
d) Network Access
View Answer
Answer: b
Explanation: The four layers of the TCP/IP stack (also called the DoD model) are
Application/Process, Host-to-Host, Internet, and Network Access. The Host-to-Host
layer is equivalent to the Transport layer of the OSI model.
2. You want to implement a mechanism that automates the IP configuration, including
IP address, subnet mask, default gateway, and DNS information. Which protocol will
you use to accomplish this?
a) SMTP
b) SNMP
c) DHCP
d) ARP
View Answer
Answer: c
Explanation: Dynamic Host Configuration Protocol (DHCP) is used to provide IP
information to hosts on your network. DHCP can provide a lot of information, but
the most common is the IP address, subnet mask, default gateway, and DNS
information.
3. The DoD model (also called the TCP/IP stack) has four layers. Which layer of the
DoD model is equivalent to the Network layer of the OSI model?
a) Application
b) Host to Host
c) Internet
d) Network Access
View Answer
Answer: c
Explanation: The four layers of the DoD model are Application/Process, Host-to-
Host, Internet, and Network Access. The Internet layer is equivalent to the Network
layer of the OSI model.
4. Which of the following protocols uses both TCP and UDP?
a) FTP
b) SMTP
c) Telnet
d) DNS
View Answer
Answer: d
Explanation: DNS and some other services work on both TCP and the UDP protocols.
DNS uses TCP for zone exchanges between servers and UDP when a client is trying to
resolve a hostname to an IP address.
5. Length of Port address in TCP/IP is _________
a) 4bit long
b) 16bit long
c) 32bit long
d) 8 bit long
View Answer
Answer: b
Explanation: TCP and UDP port numbers are 16 bits in length. So, valid port numbers
can theoretically take on values from 0 to 65,535. These values are divided into
ranges for different purposes, with certain ports reserved for particular uses.
6. TCP/IP layer is equivalent to combined Session, Presentation and _________
a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
View Answer
Answer: b
Explanation: TCP/IP network model is a hierarchical protocol made up of interactive
modules, each of which provides a specific functionality; however, the modules are
not necessarily interdependent. It is equivalent to combined session, presentation
and application layer.
7. How many levels of addressing is provided in TCP/IP protocol?
a) One
b) Two
c) Three
d) Four
View Answer
Answer: d
Explanation: Four levels of addresses are used in the internet employing the TCP/IP
protocols. They are physical (link) addresses, logical (IP) addresses, port
addresses, and specific addresses.
8. Virtual terminal protocol is an example of _________
a) Network layer
b) Application layer
c) Transport layer
d) Physical layer
View Answer
Answer: b
Explanation: In open systems, a virtual terminal (VT) is an application service. It
allows host terminals on a multi-user network to interact with other hosts
regardless of terminal type and characteristics.
9. TCP/IP is related to __________
a) ARPANET
b) OSI
c) DECNET
d) ALOHA
View Answer
Answer: a
Explanation: In 1983, TCP/IP protocols replaced NCP (Network Control Program) as
the ARPANET�s principal protocol. And ARPANET then became one component of the
early Internet. The starting point for host-to-host communication on the ARPANET in
1969 was the 1822 protocol, which defined the transmission of messages to an IMP.
10. A device operating at network layer is called __________
a) Router
b) Equalizer
c) Bridge
d) Repeater
View Answer
Answer: a
Explanation: A router is a networking device that forwards data packets between
computer networks. Routers perform the traffic directing functions on the Internet.
It supports different network layer transmission standards. Each network interface
is used to enable data packets to be forwarded from one transmission system to
another.
11. A device operating at physical layer is called __________
a) Router
b) Equalizer
c) Bridge
d) Repeater
View Answer
Answer: d
Answer: c
Explanation: A MAN often acts as a high speed network to allow sharing of regional
resources. It typically covers an area of between 5 and 50 km diameter. Examples of
MAN are telephone company network that provides a high speed DSL to customers and
cable TV network.
3. Station on a wireless ALOHA network is maximum of ________
a) 400 Km
b) 500 Km
c) 600 Km
d) 700 Km
View Answer
Answer: c
Explanation: The stations on wireless ALOHA networks are a maximum of 600 km apart.
It was designed for a radio (wireless) LAN, but it can be used on any shared
medium. It is obvious that there are potential collisions in this arrangement. The
medium is shared between the stations.
4. IEEE 802.11 defines basic service set as building block of a wireless
___________
a) LAN
b) WAN protocol
c) MAN
d) ALOHA
View Answer
Answer: a
Explanation: The IEEE 802.11 topology consists of components interacting to provide
a wireless LAN. It enables station mobility transparent to higher protocol layers,
such as the LLC.
5. In wireless LAN, there are many hidden stations so that __________ cannot be
detected.
a) Frames
b) Collision
c) Signal
d) Data
View Answer
Answer: b
Explanation: In wireless networking, the hidden node problem or hidden terminal
problem occurs when a node is visible from a wireless access point (AP), but not
from other nodes communicating with said AP. This leads to difficulties in media
access control and collisions could not be detected.
6. A set that makes stationary or mobile wireless station and also have optional
central base station is known as ___________
a) Basic service set
b) Extended service set
c) Network point set
d) Access point
View Answer
Answer: a
Explanation: A set that makes stationary or mobile wireless station and also have
optional central base station is known as a basic service set. BSS is made of
stationary or mobile wireless stations and an optional central base station, known
as the access point (AP).
7. Wireless communication started in _________
a) 1869
b) 1895
c) 1879
d) 1885
View Answer
Answer: b
Explanation: In England, Guglielmo Marconi began his wireless experiments in 1895.
On 2 June 1896, he filed his provisional specification of a patent for wireless
telegraphy. He demonstrated the system to the British Post Office in July.
8. Wireless transmission is divided into ___________
a) 3 broad groups
b) 6 broad groups
c) 9 broad groups
d) 8 broad groups
View Answer
Answer: a
Explanation: We can divide wireless transmission into three broad groups: radio
waves, microwaves, and infrared waves. Radio waves are used for multicast
communications, such as AM and FM radio, television, maritime radio, cordless
phones and paging systems. Microwave propagation is line-of-sight.
9. Transmission Control Protocol/Internet Networking Protocol have ___________
a) Four Layers
b) Five Layers
c) Six Layers
d) Seven Layers
View Answer
Answer: a
Explanation: TCP/IP functionality is divided into four layers, each with its own
set of agreed-upon protocols: The datalink layer consists of methods and protocols
that operate only on a link. The Internet layer connects independent networks to
transport the packets. The Transport layer handles communications between. The
Application layer standardizes data exchange for applications.
10. Packets of data that is transported by IP is called __________
a) Datagrams
b) Frames
c) Segments
d) Encapsulate message
View Answer
Answer: a
Explanation: The format of data that can be recognized by IP is called an IP
datagram. It consists of two components, the header and data, which need to be
transmitted. The fields in the datagram, except the data, have specific roles to
perform in the transmission of data.
11. Parameter that is normally achieved through a trailer added to end of frame is
___________
a) Access Control
b) Flow Control
c) Error Control
d) Physical addressing
View Answer
Answer: c
Answer: b
Explanation: The main advantage of IPv6 over IPv4 is its larger address space. The
length of an IPv6 address is 128 bits, compared with 32 bits in IPv4. The address
space therefore has 2128 or approximately 3.4�1038 addresses.
2. Three strategies used to handle transition from version 4 to version 6 are dual-
stack, tunneling and ________
a) Header Switching
b) Header Translation
c) Header Transfer
d) Header Transmission
View Answer
Answer: b
Explanation: Three strategies used to handle transition from version 4 to version 6
are dual-stack, tunneling and header translation. Header translation techniques are
more complicated than IPv4 NAT because the protocols have different header formats.
3. MTU stands for _________
a) Minimum Transfer Unit
b) Maximum Transfer Unit
c) Maximum Transport Unit
d) Maximum Transmission Unit
View Answer
Answer: b
Explanation: In computer networking, the maximum transmission unit (MTU) is the
size of the largest network layer protocol data unit that can be communicated in a
single network transaction.
4. In IPv6, real-time audio or video, particularly in digital form, requires
resources such as __________
a) Fixed Bandwidth
b) Variable Bandwidth
c) High Bandwidth
d) Low Bandwidth
View Answer
Answer: c
Explanation: In IPv6, real-time audio or video, particularly in digital form,
requires resources such as high bandwidth, large buffers, long processing times,
and so on. A process can make a reservation for these resources beforehand to
guarantee that real time data will not be delayed.
5. In practical IPv6 application, a technology encapsulates IPv6 packets inside
IPv4 packets, this technology is called _______
a) Tunneling
b) Hashing
c) Routing
d) NAT
View Answer
Answer: a
Explanation: IPv6 tunneling enables IPv6 hosts and routers to connect with other
IPv6 hosts and routers over the existing IPv4 Internet. The main purpose of IPv6
tunneling is to deploy IPv6 as well as maintain compatibility with large existing
base of IPv4 hosts and routers.
6. Which one of the following descriptions about IPv6 is correct?
a) Addresses are not hierarchical and are assigned at random
b) Broadcasts have been eliminated and replaced with multicasts
c) There are 2.7 billion available addresses
d) An interface can only be configured with one IPv6 address
View Answer
Answer: b
Explanation: In IPv6, there�s no longer any broadcast, sending one packet to a
large number of unspecified hosts. There�s only multicast, unicast and anycast. In
IPv6 all nodes are required to support multicast.
7. The header length of an IPv6 datagram is ___________
a) 10bytes
b) 25bytes
c) 30bytes
d) 40bytes
View Answer
Answer: d
Explanation: IPv6 datagram has fixed header length of 40bytes. It results in faster
processing of the datagram. Fixed length IPv6 header allows the routers to process
the IPv6 datagram packets more efficiently.
8. In the IPv6 header, the traffic class field is similar to which field in the
IPv4 header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
View Answer
Answer: c
Explanation: This field enables to have different types of IP datagram. In an IPv6
packet, the Traffic Class byte is used in the same way as the ToS byte in an IPv4
packet. A ToS/Traffic Class byte includes a DSCP (Differentiated Services
Codepoint) and precedence bits.
9. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
View Answer
Answer: d
Explanation: All the features are only present in IPv4 and not IPv6. IPv6 no longer
has a header checksum to protect the IP header, meaning that when a packet header
is corrupted by transmission errors, the packet is very likely to be delivered
incorrectly.
10. IPv6 is designed to allow extension of the _________
a) Protocol
b) Dataset
c) Headers
d) Routes
View Answer
Answer: a
Explanation: IPv6 is designed to allow the extension of the protocol if required by
new technologies or applications. IPv6 uses a new header format in which options
are separated from the base header and inserted, when needed, between the base
header and upper-layer data.
11. In IPv6, base header can be followed by, up to _________
a) Six Extension Layers
b) Six Extension Headers
c) Eight Extension headers
d) Eight Extension layers
View Answer
Answer: b
Explanation: The length of the base header is 40 bytes. However, to give more
functionality to the IP datagram, the base header can be followed by up to six
extension headers.
12. In an IPv6 datagram, M bit is 0, value of HLEN is 5, value of total length is
200 and offset value is ___________
a) 400
b) 350
c) 300
d) 200
View Answer
Answer: d