Documente Academic
Documente Profesional
Documente Cultură
MissionMca.com
14. Demultiplexing
demultiplexer (or demux) is a device taking a single input signal and selecting one of many
data-output-lines, which is connected to the single input.
15. frequency division multiplexing (FDM)
FDM is a technique by which the total bandwidth available in a communication mediumis
divided into a series of non-overlapping frequency sub-bands, each of which is used to carry
a separate signal.
16. Time division multiplexing (TDM).
TDM is a type of digital (or rarely analog) multiplexing in which two or more bit streams or
signals are transferred appearing simultaneously as sub-channels in one communication
channel, but are physically taking turns on the channel.
17. guard bands
a guard band is an unused part of the radio spectrum between radio bands, for the purpose of
preventing interference.
18. What techniques are used for multiplexing?
Two techniques for multiplexing in telecommunications networks are in common use:
frequency division multiplexing (FDM) and time division multiplexing (TDM).
19. LAN,MAN,WAN
LAN: (local area network as listed in our computer terms page) A group of computers that
share a common connection and are usually in a small area or even in the same building.
MAN: (metropolitan area network) This is a larger network that connects computer users in a
particular geographic area or region. For example a large university may have a network so
large that it may be classified as a MAN. The MAN network usually exist to provide
connectivity to local ISPs, cable tv, or large corporations.
WAN: (wide area network) This is the largest network and can interconnect networks
throughout the world and is not restricted to a geographical location. The Internet is an
example of a worldwide public WAN.
20. Switching Techniques
a. circuit switching : Communication via circuit switching implies that there is a
dedicated communication path between two stations.
b. packet switching: Packet switching is a digital networking communications method
that groups all transmitted data regardless of content, type, or structure into suitably
sized blocks, called packets.
21. Asynchronous transfer mode
Asynchronous transfer mode (ATM), also known as cell relay, is in some ways similar to
packet switching. Like packet switching, ATM involves the transfer of data in discrete
chunks. Also, like packet switching, ATM allows multiple logical connections to be
multiplexed over a single physical interface.
22. TCP IP Protocol
is the basic communication language or protocol of the Internet. It can also be used as a
communications protocol in a private network
23. OSI Model
The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a product of the Open
Systems Interconnection effort at theInternational Organization for Standardization. It is a
MissionMca.com
MissionMca.com
inductance and capacitance which distort the amplitude of signals and also delay the signals
at different frequencies by different amounts. It is caused by the fact that different Fourier
components travel at different speed.
33. What is fading? What are its type?
The term fading refers to the time variation of received signal power caused by changes
in the transmission medium or path(s). Fast fading: Fast fading occurs when the
coherence time of the channel is small relative to the delay constraint of the channel. In
this regime, the amplitude and phase change imposed by the channel varies considerably
over the period of use. Slow Fading: slow-fading channel, it is not possible to use time
diversity because the transmitter see only a single realization of the channel within its
delay constraint. A deep fade therefore lasts the entire duration of transmission and
cannot be mitigated using coding.
34. What is error correction? What are its type?
a. forward error correction FEC) or channel coding is a technique used for controlling errors
in data transmission over unreliable or noisy communication channels.
b. backward error correction: in which the receiver merely detects the presence of errors and
then sends a request back to the transmitter to retransmit the data in error. Backward error
correction is not practical in many wireless applications.
35. What is ASK, FSK, PSK
ASK refers to a type of amplitude modulation that assigns bit values to discrete amplitude
levels. The carrier signal is then modulated among the members of a set of discrete values to
transmit information.
FSK refers to a type of frequency modulation that assigns bit values to discrete frequency
levels. FSK is divided into noncoherent and coherent forms. In noncoherent forms of FSK,
the instantaneous frequency shifts between two discrete values termed the mark and
space frequencies. In coherent forms of FSK, there is no phase discontinuity in the output
signal. FSK modulation formats generate modulated waveforms that are strictly real values,
and thus tend not to share common features with quadrature modulation schemes.
PSK in a digital transmission refers to a type of angle modulation in which the phase of the
carrier is discretely variedeither in relation to a reference phase or to the phase of the
immediately preceding signal elementto represent data being transmitted. For example,
when encoding bits, the phase shift could be 0 degree for encoding a 0, and 180 degrees for
encoding a 1, or the phase shift could be 90 degrees for 0 and +90 degrees for a 1,
thus making the representations for 0 and 1 a total of 180 degrees apart.
36. Amplitude Modulation
amplitude modulation A form of modulation in which the amplitude of a carrier wave is
varied in accordance with some characteristic of the modulating signal.
37. Frequency Modulation
frequency modulation (FM) conveys information over a carrier wave by varying its
instantaneous frequency. This contrasts with amplitude modulation, in which
the amplitude of the carrier is varied while its frequency remains constant.
MissionMca.com
In analog applications, the difference between the instantaneous and the base frequency of the
carrier is not directly proportional to the instantaneous value of the input-signal amplitude but
it is proportional to frequency
38. Pulse Code Modulation
Pulse-code modulation (PCM) is a method used to digitally represent sampled analog signals.
It is the standard form for digital audio in computers and various Blu-ray, DVD andCompact
Disc formats, as well as other uses such as digital telephone systems. A PCM stream is a
digital representation of an analog signal, in which the magnitude of the analog signal is
sampled regularly at uniform intervals, with each sample being quantized to the nearest value
within a range of digital steps.
39. What is spread spectrum
Spread spectrum techniques involve spreading the bandwidth needed to transmit data
which does not make sense at first sight. Spreading the bandwidth has several advantages.
The main advantage is the resistance to narrowband interference.
40. FHSS
Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by
rapidly switching a carrier among many frequency channels, using a pseudorandom sequence
known to both transmitter and receiver. It is utilized as a multiple access method in
the frequency-hopping code division multiple access (FH-CDMA) scheme.
41. DSSS
direct-sequence spread spectrum (DSSS) is a modulation technique. As with other spread
spectrumtechnologies, the transmitted signal takes up more bandwidth than the information
signal that modulates the carrier or broadcast frequency. The name spread spectrum comes
from the fact that the carrier signals occur over the full bandwidth (spectrum) of a devices
transmitting frequency.
42. Parity Check
parity checking: A technique used to detect memory or data communication errors. The
computer adds up the number of bits in a one-byte data item, and if the parity bit setting
disagrees with the sum of the other bits, the computer reports an error. Parity-checking
schemes work by storing a one-bit digit (0 or 1) that indicates whether the sum of the bits in a
data item is odd or even. When the data item is read from memory or received by another
computer, a panty check occurs. If the parity check reveals that the parity bit is incorrect, the
computer displays an error message
43. Cyclic Redundancy Check
A cyclic redundancy check (CRC) is an error-detecting code commonly used in
digital networks and storage devices to detect accidental changes to raw data. Blocks of data
entering these systems get a short check value attached, based on the remainder of
a polynomial division of their contents; on retrieval the calculation is repeated, and corrective
action can be taken against presumed data corruption if the check values do not match.
44. Hamming Code
Hamming codes are a family of linear error-correcting codes that generalize
the Hamming(7,4)-code invented by Richard Hamming in 1950. Hamming codes can detect
up to two and correct up to one bit errors. By contrast, the simpleparity code cannot correct
errors, and can detect only an odd number of errors. Hamming codes are special in that they
are perfect codes, that is, they achieve the highest possible rate for codes with their block
length and minimum distance 3
45. BCH Codes
MissionMca.com
BCH codes form a class of cyclic error-correcting codes that are constructed using finite
fields. BCH codes were invented in 1959 by Hocquenghem, and independently in 1960
by Bose and Ray-Chaudhuri.[1] The abbreviation BCH comprises the initials of these
inventors names. One of the key features of BCH codes is that during code design, there is a
precise control over the number of symbol errors correctable by the code
46. convolutional code
convolutional code is a type of error-correcting code in which each m-bit information symbol
(each m-bit string) to be encoded is transformed into an n-bit symbol, where m/n is the
code rate (n m) and the transformation is a function of the last k information symbols,
where k is the constraint length of the code.
47. 1G, 2G, 3G mobile System
*Refer Q.A wise notes
48. GPRS
General packet radio service (GPRS) is a packet oriented mobile data service on
the 2G and 3G cellular communication systems global system for mobile
communications(GSM).
49. GSM
GSM is Global System for Mobile Communications. GSM is a wireless platform that uses
radio frequencies. It has been designed for speech services and uses circuit switched
transmission.
50. GSM vs CDMA
*Refer book
51. What is Handoff? What are its type?
When a mobile user travels from one area of coverage or cell to another cell within a calls
duration the call should be transferred to the new cells base station. Otherwise, the call will
be dropped because the link with the current base station becomes too weak as the mobile
recedes. Indeed, this ability for transference is a design matter in mobile cellular system
design and is call handoff.
Two basic types of handoff are definedviz. hard handoff and soft handoff.
52. cordless systems
cordless systems have evolved from cordless telephone technology. Originally,
cordless telephones were developed to provide users with mobility within a residence or
small
office by separating the handset from the rest of the telephone (called the base station) and
providing a simple analog wireless link.
53. wireless local loop (WLL)
Wireless local loop (WLL), is a term for the use of a wireless communications link as the
last mile / first mile connection for delivering plain old telephone service (POTS)
and/orbroadband Internet to telecommunications customers. Various types of WLL systems
and technologies exist.
54. IEEE 802.16
EEE 802.16 is a series of Wireless Broadband standards authored by the Institute of
Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a
working group in 1999 to develop standards for broadband for Wireless Metropolitan Area
MissionMca.com
Networks. The Workgroup is a unit of the IEEE 802 local area network and metropolitan area
network standards committee.
55. Mobile IP
Mobile IP (or IP mobility) is an Internet Engineering Task Force (IETF) standard
communications protocol that is designed to allow mobile device users to move from one
network to another while maintaining a permanent IP address.
56. Wireless Application Protocol (WAP)
Forum to provide mobile users of wireless phones and other wireless terminals such as
pagers and personal digital assistants (PDAs) access to telephony and information
services,
including the Internet and the Web.
57. Wireless Markup Language (WML)
WML was designed to describe content and format for presenting data on devices with
limited bandwidth, limited screen size, and limited user input capability. It is designed to
work
with telephone keypads, styluses, and other input devices common to mobile, wireless
communication.
58. WMLScript
WML Script is a scripting language with similarities to JavaScript. It is designed for
defining script-type programs in a user device with limited processing power and memory.
59. Wireless Application Environment (WAE)
The WAE specifies an application framework for wireless devices such as mobile
telephones,
pagers, and PDAs. In essence, the WAE consists of tools and formats that are intended to
ease
the task of developing applications and devices supported by WAP.
60. Wireless Session Protocol (WSP)
WSP provides applications with an interface for two session services. The connection
oriented
session service operates above the reliable transport protocol WTP, and the connectionless
session service operates above the unreliable transport protocol WDP. In essence, WSP is
based
on HTTP with some additions and modifications to optimize its use over wireless channels
61. Wireless Transaction Protocol (WTP)
WTP manages transactions by conveying requests and responses between a user agent (such
as a
WAP browser) and an application server for such activities as browsing and e-commerce
transactions. WTP provides a reliable transport service but dispenses with much of the
overhead
of TCP, resulting in a lightweight protocol that is suitable for implementation in thin clients
(e.g., mobile nodes) and suitable for use over low-bandwidth wireless links.
62. Wireless Datagram Protocol (WDP)
WDP is used to adapt a higher-layer WAP protocol to the communication mechanism
MissionMca.com
(called the bearer) used between the mobile node and the WAP gateway. Adaptation may
include
partitioning data into segments of appropriate size for the bearer and interfacing with the
bearer
network.
63. IEEE 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN)
computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and
maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of
the standard was released in 1997 and has had subsequent amendments. These standards
provide the basis for wireless network products using the Wi-Fi brand.
64. WiFi
WiFi is a popular technology that allows an electronic device to exchange
data wirelessly(using radio waves) over a computer network, including high-speed
Internet connections.
65. What is Bluetooth?
Bluetooth is a wireless technology standard for exchanging data over short distances (using
short-wavelength radio transmissions in theISM band from 24002480 MHz) from fixed and
mobile devices, creating personal area networks (PANs) with high levels of security. Created
by telecom vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative
to RS-232 data cables. It can connect several devices, overcoming problems of
synchronization.
66. What is Piconets?
A piconet is an ad-hoc computer network linking a wireless user group of devices
using Bluetooth technology protocols. It allows one master device to interconnect with up to
seven active slave devices. Up to 255 further slave devices can be inactive, or parked, which
the master device can bring into active status at any time.
67. Scatternets
A scatternet is a type of ad-hoc computer network consisting of two or more piconets. The
terms scatternet and piconet are typically applied to Bluetooth wireless technology.
68. Logical Link Control (LLC)
In the seven-layer OSI model of computer networking, the logical link control (LLC) data
communication protocol layer is the upper sublayer of the data link layer, which is itself layer
2. The LLC sublayer provides multiplexing mechanisms that make it possible for several
network protocols (IP, IPX, Decnetand Appletalk) to coexist within a multipoint network and
to be transported over the same network media. It can also provide flow
control and automatic repeat request (ARQ) error management mechanisms.
69. XHTML
XHTML (Extensible HyperText Markup Language) is a family of XML markup
languages that mirror or extend versions of the widely used Hypertext Markup
Language (HTML), the language in which web pages are written.
70. CHTML
C-HTML (short for Compact HyperText Markup Language), also called i-mode-HTML,[1] is
a subset of HTML for small information devices, such as first-generation smart phones
and PDAs, such as DoCoMos i-mode mobile phones used in Japan. C-HTML adds several
features not found in standard HTML, notably accesskeys, phone number shortcuts for links,
MissionMca.com
and emojipictorial characters as locally extended Shift JIS, all concepts borrowed
from HDML and WML.
71. 2.5G
2.5G (second and a half generation) is used to describe 2G-systems that have implemented
a packet-switched domain in addition to the circuit-switched domain. It does not necessarily
provide faster services because bundling of timeslots is used for circuit-switched data
services (HSCSD) as well. The first major step in the evolution of GSM networks to 3G
occurred with the introduction of General Packet Radio Service (GPRS).
72. 3rd generation of mobile
third Generation, is a term used to represent the 3rd generation of mobile telecommunications
technology. Also called Tri-Band 3G. This is a set of standards used for mobile
devices and mobile telecommunication services and networks that comply with
the International Mobile Telecommunications-2000 (IMT-2000) specifications by
the International Telecommunication Union. 3G finds application in wireless
voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile
TV.
73. VSAT
VSAT is an abbreviation for a Very Small Aperture Terminal. It is basically a two-way
satellite ground station with less than 3 meters tall dish antenna stationed. The transmissions
rates of VSATs are usually from very low and up to 4 Mbit/s . These VSATs primary job is
accessing the satellites in the geosynchronous orbit and relaying data from terminals in earth
to other terminals and hubs.
74. Radio Specification
The Bluetooth radio specification is a short document that gives the basic details of radio
transmission for Bluetooth devices.
75. Baseband Specification
The Bluetooth baseband consists mainly of a Link Controller (LC) that carries out baseband
protocols and low-layer link routines. Protocols defined within the scope of the baseband
specification include (among others) physical channels and links, data packet definitions,
error correction and detection, logical channels, channel control, and hop selection. For more
information about the Bluetooth baseband specification, see the Bluetooth core specification
document.
76. Symbian OS
Symbian OS is one of Nokias mobile operating systems for mobile devices and low-end
smartphones, with associated libraries, user interface, frameworks and reference
implementations of common tools, originally developed by Symbian Ltd. The Symbian
Operating System is an operating system designed mainly for mobile devices. Symbian
77. iOS
iOS (previously iPhone OS) is a mobile operating system developed and distributed by Apple
Inc. Originally released in 2007 for theiPhone and iPod Touch, it has been extended to
support other Apple devices such as the iPad and Apple TV. Unlike MicrosoftsWindows
Phone (Windows CE) and Googles Android, Apple does not license iOS for installation on
non-Apple hardware
78. Android OS
ndroid is a Linux-based operating system designed primarily for touchscreen mobile devices
such as smartphones and tablet computers.
MissionMca.com
79. MIDP
The Mobile Information Device Profile (MIDP) is key element of the Java 2 Platform,
Mobile
Edition (J2ME). When combined with the Connected Limited Device Configuration (CLDC),
MIDP provides a standard runtime Java environment for todays most popular mobile
information devices, such as cell phones and mainstream personal digital assistants (PDAs).
80. WCDMA
WCDMA is the radio access scheme used for Third Generation cellular systems that are
being rolled out in various parts of the globe. The 3G systems to support wideband services
like
high-speed Internet Access, video and high quality image transmission with the same quality
as
the fixed networks. In WCDMA systems the CDMA air interface is combined with GSM
based
networks. The WCDMA standard was evolved through the Third Generation Partnership
Project
(3GPP) which aims to ensure interoperability between different 3G networks.
81. FDMA
The satellite is used as in intermediate device providing, in effect, a point-to-point link
between
two earth stations. Because of the wide area coverage of the satellite, this is not
necessarily the case to be divided using FDM into a number of smaller channels, each of
which uses FM. Each of the smaller channels in turn carries a number of voice frequency
(VF) signals using FDM. The ability of multiple earth stations to access the same channel
is referred to as FDMA.
82. Bluetooth Architecture
*Refer notes
83. GSM Architecture
*Refer notes
84. List the transmission impairment effecting the wireless transmission
Analog signal consist of varying a voltage with time to represent an information steam. If
the transmission media were perfectly, the receiver could receive exactly the same signal that
the
transmitter sent. But communication lines are usually not perfect, so the receive signal is not
the
same as the transmitted signal. For digital data this difference can lead to errors.
Transmission
lines suffers from three major problems
1. Attenuation
2. Delay distortions
3. Noise
85. Short Message Service(SMS)
is a text messaging service component of phone, web, or mobile communication systems,
using standardized communications protocols that allow the exchange of short text messages
between fixed line or mobile phone device
86. CLDC configuration, and different profile supported by it?
MissionMca.com
10
MissionMca.com
11
pagers, personal digital assistants, cell phones, dedicated terminals, and handheld
consumer
devices with between 128KB and 512KB of memory.
2. Connected Device Configuration (CDC)
CDC devices use a 32-bit architecture, have at least two megabytes of memory
available,
and implement a complete functional JVM. CDC devices include digital set-top
boxes, home appliances, navigation systems, point-of-sale terminals, and smart
phones.
89. Various Profile supported by J2ME
Game Profile : The Game Profile is also used with the CDC configuration and contains
the necessary classes for developing game applications for any small computing device
that uses the CDC configuration.
Mobile Information Device Profile : The Mobile Information Device Profile (MIDP) is
used with the CLDC configuration and contains classes that provide local storage, a user
interface, and networking capabilities to an application that runs on a mobile computing
device such as Palm OS devices. MIDP is used with wireless Java applications.
PDA Profile : The PDA Profile (PDAP) is used with the CLDC configuration and
contains classes that utilize sophisticated resources found on personal digital assistants.
These features include better displays and larger memory than similar resources found on
MIDP mobile devices.
Personal Profile : The Personal Profile is used with the CDC configuration and the
Foundation Profile and contains classes to implement a complex user interface. The
Foundation Profile provides core classes, and the Personal Profiles provide classes to
implement a sophisticated user interface, which is a user interface that is capable of
displaying multiple windows at a time.
Personal Basis Profile:
The Personal Basis Profile is similar to the Personal Profile in that it is used with the
CDC configuration and the Foundation Profile. However, the Personal Basis Profile
provides classes to implement a simple user interface, which is a user interface that is
capable of displaying one window at a time.
RMI Profile: The RMI Profile is used with the CDC configuration and the Foundation
Profile to provide Remote Method Invocation classes to the core classes contained in the
Foundation Profile.
MissionMca.com
12