Professional Documents
Culture Documents
2. What is the relationship between the frequency and the period of a wave?
Ans. They are inverse to each other f = 1
T
3. What is the relationship between the wavelength and the wave period?
Ans. The wavelength is the distance a wave travels during an interval of time equal to its
period. If c is the speed of light wave-length = c * wave-period
5. What are the wave parameters that can be modulated in order to encode
information?
Ans. Amplitude, Frequency and Phase modulation
Amplitude Modulation
Prepared by
Ejaz Ahmad
Frequency Modulation
Phase Modulation
13. What is the measuring unit for a communication channel data rate?
Ans. Is measured in bits per second (bps)
Prepared by
Ejaz Ahmad
14. Assuming a carrier wave of 5GHz and a symmetrical wireless channel with a
bandwidth of 40Mhz, what are the maximum frequency and the minimum
frequency in the channel.
Ans. 5Ghz + 20Mhz maximum frequency, 5GHz 20Mhz minimum frequency
20. 16/32/64 QAM constellations are compact drawings of different QAM encodings.
How many dots per quadrant would be in a16/32/64 QAM representation?
In 16 there will be 4 dots per quadrant
In 32 there will be 8 dots per quadrant
In 64 there will be 16 dots per quadrant
Prepared by
Ejaz Ahmad
23. Define Spread Spectrum transmission?
Ans. Transmissions where information to be transmitted is spread over more bandwidth than
the absolute minimum necessary.
28. What is the basic idea of Direct Sequence Spread Spectrum (DSSS)?
Ans. Mix up the information bit stream with a bit pattern code of much higher frequency
30. What are the main ways of sharing access to wireless channels?
FDMA Frequency Division multiple access
TDMA Time Division multiple access
CDMA Code Division multiple access
Prepared by
Ejaz Ahmad
31. Define TDMA
Ans. In TDMA only one can talk at a time and others have to wait for their turn. Everyone
can use the whole frequency of the channel for an amount of time.
35. In a DS-CDMA wireless channel each user has a unique modulation code. What is
the necessary property these user codes must have so that the information can be
retrieved from the channel?
Ans. Each user gets his own orthogonal code and receiver must know this code (language) in
order to retrieve the information.
41. What are the advantages of OFDM versus other transmission techniques?
Highly efficient use of the bandwidth
Robust to narrowband jamming
Efficient DSP algorithms for encoding and retrieving
Prepared by
Ejaz Ahmad
42. How is an OFDMA channel shared between its users?
Ans. OFDMA is a hybrid FDMA + TDMA access method to a shared channel. Here each
user gets a subset of the sub-carriers for a time slot.
47. How does the direction in which, a source travel relative to a receiver influence the
Doppler frequency shift?
Ans. Frequency is higher when source is travelling
towards the receiver and frequency is lower when
travelling away from the receiver.
Prepared by
Ejaz Ahmad
52. What are the main industry drivers for wireless networks?
Ans. Main drivers are
Evolution of wired LANs to wireless LANs
Evolution of wired telephony to mobile telephony.
54. How do mobile telephony standards and mobile computing standards overlap in the
WAN?
Ans. They support similar and comparable services: Voice, Data, Video and Mobility.
55. What are the main categories of wireless networks based on area coverage?
WPAN Personal Area Networks (e.g. Bluetooth)
WLAN Local Area Networks (e.g. Wifi)
WMAN Metropolitan Area Networks (WiMax)
WRAN Regional Area Networks
Prepared by
Ejaz Ahmad
59. What are the main three ways of using MIMO transmit antennas in 802.11n?
Spatial Multiplexing (SM)
Space-Time Block Coding (STBC)
Beam Forming
65. What modulations schemes are used by 802.16n and how do they change?
Ans. BPSK, QPSK, 16-QAM, 64-QAM modulation schemes are negotiated depending on the
channel conditions.
67. What is the Network Allocation Vector (NAV) and how is it used?
Ans. In 802.16 Wimax each node has NAV which tells the node when it can try to access the
medium. Each node updates its NAV based on frame duration.
Prepared by
Ejaz Ahmad
70. What is an 802.11 Wi-Fi ad-hoc network?
Ans. It is simplest construction for WLAN which connects PC (laptop)
with peer to peer model by wireless card
72. How do the 802.16 WMAN standards differ in terms mobility and LOS operations?
802.16 is LOS only and Fixed
802 16 a/d is NLOS but still Fixed service
802.16 e is NLOS and low mobility
802.20 is NLOS and high mobility (supports vehicle speeds)
74. How does the fixed WiMax (802.16d) MAC differs from 802.11 MAC?
Ans. Fixed WiMax (802.16d) MAC is Non-contention, centralized control and grant based
MAC while 802.11 MAC is contention and distributed based MAC (CSMA/CA).
75. What equipment plays the role of central arbiter in 802.16d WiMax networks?
Ans. The Base Station
77. How does a Subscriber Station know when to transmit in an 802.16d WiMax
network?
Ans. It gets this information by receiving the Uplink Map schedule through the downlink
subframe.
Prepared by
Ejaz Ahmad
78. How do 802.11 Wi-Fi networks differ from 802.16 WiMax networks in terms of
range/number of users/channel configuration/Quality of Service?
79. What is the dominant wireless channel sharing technique in 3G/4G cellular
networks?
Ans. Long Term Evolution (LTE)
81. How do LTE advanced downlink/uplink rates differ from LTE downlink/uplink
rates?
Ans. LTE advanced ranges are approximately 5 times higher.
Downlink LTE 20Mbps, LTE-A 100 Mbps;
Uplink LTE 10Mbps, LTE-A 60 Mbps
Prepared by
Ejaz Ahmad
85. Name the characteristics of distributed systems
Resource sharing
Concurrency
Transparency
Fault Tolerance
Openness
Scalability
87. What are the two main models of managing resources in distributed systems?
1. Resource Managers software managing a type of resource (servers)
2. Object Managers collection of functions and data specific to a class of objects
Prepared by
Ejaz Ahmad
92. Define Location / Concurrency / Failure / Scaling transparency
Location transparency no need to know where objects reside
Concurrency transparency transparent access of parallel processes to shared
information objects
Failure transparency hide hardware and software failures from the user
Scaling transparency expand system without affecting service or requiring
software re-work
94. Name the four necessary steps in dealing with faults in a fault tolerant system?
1. Fault detection
2. Fault isolation
3. Fault masking
4. Fault recovery
97. Name the two essential approaches to building fault tolerant systems
1. Hardware redundancy (standby spare hardware)
2. Software checkpoints (save consistent state of the system as checkpoint)
Prepared by
Ejaz Ahmad
101. What categories of user requirements must be addressed by a distributed system?
Functionality
Quality of Service
Reconfigurability
106. Give an example of a flat name space and an example of a hierarchical name space
Hierarchical name space desktop folder, Internet domains
Flat name space files names in a folder, account ID
110. What is the difference between a synchronous and an asynchronous message sent?
Synchronous (blocking send) sender blocks waiting for a reply
Asynchronous sender does not block, picks up the reply later
Prepared by
Ejaz Ahmad
111. Name the three steps of a client-server communication pattern
1. Request from client to server process
2. Execution of request at the server process
3. Transmission of reply to the client
Prepared by
Ejaz Ahmad
119. Describe the cache consistency problem
Ans. It deals with the problem of how to keep copies of data cached in local memories up to
date with the master copy.
121. What is the root cause for local time variations in computers?
Ans. Local time is kept by oscillating crystals that are drifting in time.
122. Assume that the event E1, produced in the processor P1 is time stamped with a time
value T1 and that event E2, produced in the processor P2 is time-stamped with the
time value T2. If T1=T2, can we say that the events happened at the same time?
Ans. As clocks of different processors drift, even if two events are time stamped with same
value it doesnt means that they happened at the same time.
125. What does the Christians network time algorithm establish about the possible
precision in time synchronization?
Ans. The possible precision interval grows with the roundtrip time from
the node to the time source
127. What is the difference between a Stratum 1 and a Stratum 2 NTP server?
Stratum 1 servers: These are primary servers which are directly connected to a radio
clock receiving UTC signals
Stratum 2 servers: These are secondary servers which get synchronized to primary
servers
Prepared by
Ejaz Ahmad
128. What are the main synchronization modes in NTP?
Multicast mode
Procedure-call mode
135. What are the two types of devices used by real-time controllers to exercise control
over physical processes and what is their role?
Sensors: their role is to feed relevant data about the physical process to the controller.
Actuators: their role is to exercise control by changing some parameters of the
physical process
Prepared by
Ejaz Ahmad
136. What is a real-time deadline?
Ans. The latest point in time when a task/process must respond to an external event.
137. How do soft real-time deadlines differ from hard real-time deadlines?
In soft real-time systems, there is still value in a missed deadline.
In hard real-time systems, there is no value in a missed deadline.
142. What is the difference between hardware versus software Interrupt dispatching?
Hardware Dispatching - Multiple interrupt signals are processed by interrupt
controller.
Software Dispatching - A single interrupt signal is processed by a software handler
Prepared by
Ejaz Ahmad