Mobile Computing Set 2
TMSI stands for
a.
Time Module subscriber Identity
b.
Total Module subscriber Identity
c. Tem porary Module subscriber
Identity
d. Travel Module subscriber Identity
MSRN stands for Mobile Station
roaming number
______ is a situation in which a
station calls a mobile station
a. Mobile terminated call
b.
Mobile Accepted call
c.
Mobile delivered call
d. Mobile divided call
Reason for handover is
a.
moves within the range
b. moves out of the range
c.
moves constantly
d.
moves continuously
55. Reason for handover is
a. load balancing
b.
moves within the range
c.
traffic in one cell is less
d. moves continuously
GPRS offers a ___ packet transfer
service.
a. point-to-point
b.
peer-to-peer
c.
data
d. network
The typical circuit-switched
packet-oriented transfer protocol is
a. X.21
a. X.21
b.
X.22
c.
X.24
d. X.25
AIVR stands for
a. all interface user rate
b.
air interface user rate
c.
antenna interface user rate
d.
area interface user rate
Disadvantage of HSCSD is
a.
connection-less
b. connection-oriented
c.
wireless
d.
random access
Algorithm A3 is used for
a. authentication
b.
encryption
c.
encryption
d.
decryption
Algorithm A5 is used for
a.
authentication
b. encryption
c.
generation of a cipher key
d.
decryption
Algorithm A8 is used for
a.
authentication
b.
encryption
c. generation of a cipher key
d.
decryption
HSCSD stands for
a. high speed circuit switched
data
b.
high switched circuit speed data
c.
high send circuit secure data
d.
high store circuit secure data
The _____ provides packet mode
transfer for applications that exhibit traffic
patterns such as frequent transmission
of small volumes
a.
HSCSD
b.
DECT
c. GPRS
d.
PTP
GPRS stands for
a. General Packet Radio Service
b.
General Personal Retrieval Service
c.
General Peer Ratio Service
d.
General Prevent Radio Service
Assigning a optimal base
station to a mobile phone user is an application of
a.
FDMA
b.
CDMA
c.
TDMA
d. SDMA
The near/far effect is a severe
problem of wireless networks using
a.
CSMA
b. CDM
c.
TDM
The task of ____ is to establish a
reliable point to point or point to multi-point
connection between different
devices over a wired or wireless medium
a.
Minimum Access Control
b.
Maximum Access Control
c. Medium Access Control
d.
More Access Control
0 comments:
Post a Comment