Mcqs
Mcqs
Mcqs
1. What does each flow have in the discussed system to prevent hogging and allow differential loss probabilities?
- a) Dedicated server
- b) Logical queue
- c) Load balancer
- d) Shared memory
3. Which algorithm is used to simulate a fluid flow system in the discussed context?
- a) Fluid Dynamics Algorithm
- b) Ideal Queueing Algorithm
- c) Fair Queueing Algorithm
- d) Dynamic Flow Simulation Algorithm
5. Which algorithm is commonly used for policing traffic flows in packet networks?
- a) Fluid Dynamics Algorithm
- b) Leaky Bucket Algorithm
- c) Token Bucket Algorithm
- d) Round Robin Algorithm
9. Which parameter determines the maximum allowable burst arrival in the Leaky Bucket Algorithm?
- a) Leak rate
- b) Bucket depth
- c) Packet length
- d) Interarrival time
10. What does the token rate regulate in token bucket traffic policing?
- a) Packet transmission rate
- b) Token generation rate
- c) Packet arrival rate
- d) Token consumption rate
11. How does the Token Bucket Algorithm handle packets with insufficient tokens?
- a) Delay their transmission
- b) Buffer them temporarily
- c) Discard them
- d) Tag them for lower priority
12. What determines how much burstiness is allowed into the network in the Token Bucket Algorithm?
- a) Token rate
- b) Packet length
- c) Bucket depth
- d) Token generation rate
13. Which mechanism is used to ensure QoS delivery as long as the source conforms to the contract?
- a) Policing
- b) Shaping
- c) Admission control
- d) Packetization
**Answer: a) Policing**
15. What is the primary function of the Leaky Bucket Traffic Shaper?
- a) To discard non-conforming packets
- b) To negotiate traffic contracts
- c) To shape incoming traffic
- d) To monitor network traffic
16. Which parameter in the Leaky Bucket Algorithm corresponds to the nominal interarrival time?
- a) Leak rate
- b) Bucket depth
- c) Packet length
- d) Token rate
17. In the Token Bucket Algorithm, what determines whether a packet is conforming or non-conforming?
- a) Bucket depth
- b) Packet size
- c) Token rate
- d) Packet length
18. What is the function of the Leaky Bucket Algorithm with variable packet size?
- a) To regulate token transfer
- b) To negotiate traffic contracts
- c) To shape incoming traffic
- d) To monitor and control traffic flows
19. Which parameter in the Leaky Bucket Algorithm determines the rate at which tokens are consumed?
- a) Bucket depth
- b) Packet length
- c) Leak rate
- d) Token rate
20. What does the leak rate correspond to in the Leaky Bucket Algorithm?
- a) Maximum burst size
- b) Packet size
- c) Token generation rate
- d) Average contracted rate
21. How does the Leaky Bucket Algorithm handle overflow situations?
- a) By delaying packet transmission
- b) By discarding packets
- c) By increasing the bucket depth
- d) By buffering packets temporarily
22. What does WFQ stand for in the context of packet networks?
- a) Weighted Fair Queueing
- b) Weighted Fast Queueing
- c) Well-Formed Queueing
- d) Wideband Frequency Queueing
23. Which algorithm is commonly used for policing traffic flows in packet networks?
- a) Fluid Dynamics Algorithm
- b) Leaky Bucket Algorithm
- c) Token Bucket Algorithm
- d) Round Robin Algorithm
26. How does the Leaky Bucket Algorithm handle non-conforming packets?
- a) Discard them
- b) Tag them for lower priority
- c) Delay their transmission
- d) Buffer them for later transmission
**Answer: a) Discard them**
27. Which parameter determines the maximum allowable burst arrival in the Leaky Bucket Algorithm?
- a) Leak rate
- b) Bucket depth
- c) Packet length
- d) Interarrival time
28. What does the token rate regulate in token bucket traffic policing?
- a) Packet transmission rate
- b) Token generation rate
- c) Packet arrival rate
- d) Token consumption rate
29. How does the Token Bucket Algorithm handle packets with insufficient tokens?
- a) Delay their transmission
- b) Buffer them temporarily
- c) Discard them
- d) Tag them for lower priority
30. What determines how much burstiness is allowed into the network in the Token Bucket Algorithm?
- a) Token rate
- b) Packet length
- c) Bucket depth
- d) Token generation rate
31. Which mechanism is used to ensure QoS delivery as long as the source conforms to the contract?
- a) Policing
- b) Shaping
- c) Admission control
- d) Packetization
**Answer: a) Policing**
33. What is the primary function of the Leaky Bucket Traffic Shaper?
- a) To discard non-conforming packets
- b) To negotiate traffic contracts
- c) To shape incoming traffic
- d) To monitor network traffic
34. Which parameter in the Leaky Bucket Algorithm corresponds to the nominal interarrival time?
- a) Leak rate
- b) Bucket depth
- c) Packet length
- d) Token rate
35. In the Token Bucket Algorithm, what determines whether a packet is conforming or non-conforming?
- a) Bucket depth
- b) Packet size
- c) Token rate
- d) Packet length
36. What is the function of the Leaky Bucket Algorithm with variable packet size?
- a) To regulate token transfer
- b) To negotiate traffic contracts
- c) To shape incoming traffic
- d) To monitor and control traffic flows
37. Which parameter in the Leaky Bucket Algorithm determines the rate at which tokens are consumed?
- a) Bucket depth
- b) Packet length
- c) Leak rate
- d) Token rate
38. What does the leak rate correspond to in the Leaky Bucket Algorithm?
- a) Maximum burst size
- b) Packet size
- c) Token generation rate
- d) Average contracted rate
39. How does the Leaky Bucket Algorithm handle overflow situations?
- a) By delaying packet transmission
- b) By discarding packets
- c) By increasing the bucket depth
- d) By buffering packets temporarily
**Answer: b) By discarding packets**
40. What does WFQ stand for in the context of packet networks?
- a) Weighted Fair Queueing
- b) Weighted Fast Queueing
- c) Well-Formed Queueing
- d) Wideband Frequency Queueing
41. Which algorithm is commonly used for policing traffic flows in packet networks?
- a) Fluid Dynamics Algorithm
- b) Leaky Bucket Algorithm
- c) Token Bucket Algorithm
- d) Round Robin Algorithm
44. How does the Leaky Bucket Algorithm handle non-conforming packets?
- a) Discard them
- b) Tag them for lower priority
- c) Delay their transmission
- d) Buffer them for later transmission
45. Which parameter determines the maximum allowable burst arrival in the Leaky Bucket Algorithm?
- a) Leak rate
- b) Bucket depth
- c) Packet length
- d) Interarrival time
46. What does the token rate regulate in token bucket traffic policing?
- a) Packet transmission rate
- b) Token generation rate
- c) Packet arrival rate
- d) Token consumption rate
47. How does the Token Bucket Algorithm handle packets with insufficient tokens?
- a) Delay their transmission
- b) Buffer them temporarily
- c) Discard them
- d) Tag them for lower priority
48. What determines how much burstiness is allowed into the network in the Token Bucket Algorithm?
- a) Token rate
- b) Packet length
- c) Bucket depth
- d) Token generation rate
49. Which mechanism is used to ensure QoS delivery as long as the source conforms to the contract?
- a) Policing
- b) Shaping
- c) Admission control
- d) Packetization
**Answer: a) Policing**
5. What issue can arise when high-priority packets surge in HOL priority queueing?
- **a) Low-priority queue saturation**
- b) High-priority packet discard
- c) Bandwidth shortage for all packets
- d) Buffer overflow due to excessive prioritization
7. In the context of scheduling, what does "Earliest Due Date" refer to?
- a) The timestamp of packet arrival.
- **b) The deadline assigned to each packet.**
- c) The priority level of the packet.
- d) The order of packet transmission.
9. Which algorithm is used in Fair Queueing to compute finishing times for packets?
- a) FIFO
- b) Round Robin
- c) Earliest Due Date
- **d) Generalized Processor Sharing**
10. How does WFQ contribute to providing Quality of Service in packet networks?
- a) By discarding packets randomly.
- b) By prioritizing high-priority packets.
- **c) By ensuring fairness in bandwidth allocation.**
- d) By minimizing buffer size for efficient transmission.
13. How does Random Early Detection (RED) improve network performance?
- a) By dropping packets randomly to reduce congestion.
- b) By discarding packets only when the buffer is full.
- **c) By marking offending packets to cooperate with TCP sources.**
- d) By providing differential Quality of Service to different packet flows.
14. In HOL priority queueing, what happens when the high-priority queue is empty?
- a) Low-priority packets are dropped.
- **b) Low-priority packets are given priority.**
- c) High-priority packets are discarded.
- d) The transmission link is paused until the queue refills.
17. How does Fair Queueing allocate bandwidth among different packet flows?
- a) Equally among all flows
- b) Based on packet size
- **c) Proportionally to flow weight**
- d) Randomly to prevent packet hogging
18. Which algorithm is used in Fair Queueing to approximate fluid flow from queues?
- a) FIFO
- b) Round Robin
- c) Earliest Due Date
- **d) Generalized Processor Sharing**
20. In HOL priority queueing, what happens when the high-priority queue is empty?
- a) Low-priority packets are given priority.
- b) High-priority packets are discarded.
- **c) Low-priority packets are dropped.**
- d) The transmission link is paused.
23. How does Fair Queueing allocate bandwidth among different packet flows?
- a) Equally among all flows.
- b) Based on packet size.
- **c) Proportionally to flow weight.**
- d) Randomly to prevent packet hogging.
25. In HOL priority queueing, what happens when the high-priority queue is empty?
- a) Low-priority packets are given priority.
- b) High-priority packets are discarded.
- **c) Low-priority packets are dropped.**
- d) The transmission link is paused.
28. How does Fair Queueing allocate bandwidth among different packet flows?
- a) Equally among all flows.
- b) Based on packet size.
- **c) Proportionally to flow weight.**
- d) Randomly to prevent packet hogging.
30. In HOL priority queueing, what happens when the high-priority queue is empty?
- a) Low-priority packets are given priority.
- b) High-priority packets are discarded.
- **c) Low-priority packets are dropped.**
- d) The transmission link is paused.
32. What issue can arise when high-priority packets surge in HOL priority queueing?
- **a) Low-priority queue saturation**
- b) High-priority packet discard
- c) Bandwidth shortage for all packets
- d) Buffer overflow due to excessive prioritization
33. Which type of priority queueing provides differential Quality of Service (QoS)?
- a) FIFO
- b) HOL
- c) RED
- **d) Fair Queueing**
34. In the context of scheduling, what does "Earliest Due Date" refer to?
- a) The timestamp of packet arrival.
- **b) The deadline assigned to each packet.**
- c) The priority level of the packet.
- d) The order of packet transmission.
36. Which algorithm is used in Fair Queueing to compute finishing times for packets?
- a) FIFO
- b) Round Robin
- c) Earliest Due Date
- **d) Generalized Processor Sharing**
37. How does WFQ contribute to providing Quality of Service in packet networks?
- a) By discarding packets randomly.
- b) By prioritizing high-priority packets.
- **c) By ensuring fairness in bandwidth allocation.**
- d) By minimizing buffer size for efficient transmission.
40. How does Random Early Detection (RED) improve network performance?
- a) By dropping packets randomly to reduce congestion.
- b) By discarding packets only when the buffer is full.
- **c) By marking offending packets to cooperate with TCP sources.**
- d) By providing differential Quality of Service to different packet flows.
41. In HOL priority queueing, what happens when the high-priority queue is empty?
- a) Low-priority packets are dropped.
- **b) Low-priority packets are given priority.**
- c) High-priority packets are discarded.
- d) The transmission link is paused until the queue refills.
44. How does Fair Queueing allocate bandwidth among different packet flows?
- a) Equally among all flows
- b) Based on packet size
- **c) Proportionally to flow weight**
- d) Randomly to prevent packet hogging
46. In HOL priority queueing, what happens when the high-priority queue is empty?
- a) Low-priority packets are given priority.
- b) High-priority packets are discarded.
- **c) Low-priority packets are dropped.**
- d) The transmission link is paused.
49. How does Fair Queueing allocate bandwidth among different packet flows?
- a) Equally among all flows.
- b) Based on packet size.
- **c) Proportionally to flow weight.**
- d) Randomly to prevent packet hogging.
4. Which component connects the telephone to the telephone switch in a local loop?
a) Distribution cable
b) Feeder cable
c) Pedestal
d) Serving area interface
Answer: d) Serving area interface
6. Which technology is used to convert from 2-wire to 4-wire connections in telephone networks?
a) Fiber optics
b) DSL
c) Hybrid transformers
d) Echo cancellers
Answer: c) Hybrid transformers
13. Which layer of the Signaling System Protocol Stack ensures the delivery of messages to signaling nodes?
a) SCCP
b) MTP level 3
c) MTP level 2
d) MTP level 1
Answer: b) MTP level 3
17. Which type of switch is used to provide separate physical connections between inputs and outputs?
a) Crossbar switch
b) Time-slot interchange switch
c) Multistage switch
d) Fiber-optic switch
Answer: a) Crossbar switch
19. Which traffic management level involves matching traffic flows to available resources?
a) Packet level
b) Flow level
c) Flow-aggregate level
d) Aggregate level
Answer: b) Flow level
23. Which technique is used in Traffic Management to control the number of flows allowed in the network?
a) Packet dropping
b) Rate-control
c) Admission control
d) Buffer management
Answer: c) Admission control
24. What is the primary role of a Clos switch in a telecommunications network?
a) To route packets between network nodes
b) To manage traffic flows within a network
c) To provide non-blocking switching capability
d) To control access to network resources
Answer: c) To provide non-blocking switching capability
27. In Time-Share the Crossbar Switch, how is the interconnection pattern of the space switch configured?
a) It remains constant over time
b) It changes with every packet transmission
c) It adapts based on traffic load
d) It is determined by the network administrator
Answer: c) It adapts based on traffic load
29. Which component determines the maximum delay and loss probability in FIFO Queueing?
a) Buffer size
b) Packet length
c) Transmission rate
d) Arrival rate
Answer: a) Buffer size
30. What is the primary purpose of Traffic Engineering at the Flow-Aggregate Level?
a) To optimize individual packet transmissions
b) To route traffic flows efficiently across the network
c) To provide differential QoS to different traffic flows
d) To control the overall traffic load in the network
Answer: b) To route traffic flows efficiently across the network
33. Which layer of the Signaling System Protocol Stack ensures the delivery of messages to signaling nodes?
a) SCCP
b) MTP level 3
c) MTP level 2
d) MTP level 1
Answer: b) MTP level 3
36. Which switching type allows for light-in, light-out operation without optical-to-electronic conversion?
a) Space-Division switching
b) Time-Division switching
c) Hybrid switching
d) Pure Optical switching
Answer: d) Pure Optical switching
37. Which type of switch is used to provide separate physical connections between inputs and outputs?
a) Crossbar switch
b) Time-slot interchange switch
c) Multistage switch
d) Fiber-optic switch
Answer: a) Crossbar switch
39. Which traffic management level involves matching traffic flows to available resources?
a) Packet level
b) Flow level
c) Flow-aggregate level
d) Aggregate level
Answer: b) Flow level
40. What is the main drawback of FIFO Queueing in packet networks?
a) Inability to provide differential QoS
b) Excessive buffering
c) High latency
d) Unfairness in resource allocation
Answer: a) Inability to provide differential QoS
43. Which technique is used in Traffic Management to control the number of flows allowed in the network?
a) Packet dropping
b) Rate-control
c) Admission control
d) Buffer management
Answer: c) Admission control
47. In Time-Share the Crossbar Switch, how is the interconnection pattern of the space switch configured?
a) It remains constant over time
b) It changes with every packet transmission
c) It adapts based on traffic load
d) It is determined by the network administrator
Answer: c) It adapts based on traffic load
48. What is the primary advantage of Pure Optical Switching?
a) Lower cost compared to traditional switches
b) Higher reliability due to absence of electronic components
c) Greater scalability and flexibility in network design
d) Faster data transmission speeds
Answer: b) Higher reliability due to absence of electronic components
49. Which component determines the maximum delay and loss probability in FIFO Queueing?
a) Buffer size
b) Packet length
c) Transmission rate
d) Arrival rate
Answer: a) Buffer size
50. What is the primary purpose of Traffic Engineering at the Flow-Aggregate Level?
a) To optimize individual packet transmissions
b) To route traffic flows efficiently across the network
c) To provide differential QoS to different traffic flows
d) To control the overall traffic load in the network
Answer: b) To route traffic flows efficiently across the network
Lect 8
2. **During an incoming call to a mobile unit, what role does the MSC (Mobile Switching Center) play?**
- A) Selects the setup channel
- B) Broadcasts call requests on all setup channels
- C) Forwards the reply from the mobile unit to the BSS
- D) Establishes a call to the PSTN
- **Answer: D) Establishes a call to the PSTN**
11. **Which channel is used to assign a dedicated control channel in response to a request via RACH in GSM?**
- A) Paging Channel (PCH)
- B) Access Grant Channel (AGCH)
- C) Slow Associated Control Channel (SACCH)
- D) Fast Associated Control Channel (FACCH)
- **Answer: B) Access Grant Channel (AGCH)**
12. **What is the purpose of the Standalone Dedicated Control Channel (SDCCH) in GSM?**
- A) To transmit voice data
- B) To provide synchronization information
- C) For call signaling setup
- D) To broadcast cell identity information
- **Answer: C) For call signaling setup**
13. **Which channel is used to inform the mobile station of power level changes in GSM?**
- A) Fast Associated Control Channel (FACCH)
- B) Slow Associated Control Channel (SACCH)
- C) Random Access Channel (RACH)
- D) Broadcast Control Channel (BCCH)
- **Answer: B) Slow Associated Control Channel (SACCH)**
14. **Which channel is used for handover by temporarily reallocating speech slots in GSM?**
- A) Dedicated Control Channel (DCCH)
- B) Standalone Dedicated Control Channel (SDCCH)
- C) Fast Associated Control Channel (FACCH)
- D) Slow Associated Control Channel (SACCH)
- **Answer: C) Fast Associated Control Channel (FACCH)**
15. **What is the function of the Cell Broadcast Channel (CBCH) in GSM?**
- A) To transmit voice data
- B) To broadcast cell identity information
- C) To provide synchronization information
- D) To broadcast messages from a service center to mobile stations
- **Answer: D) To broadcast messages from a service center to mobile stations**
16. **Which channel is used by mobile devices to transmit voice data in GSM?**
- A) Traffic Channel (TCH)
- B) Broadcast Channel (BCH)
- C) Control Channel (CCH)
- D) Paging Channel (PCH)
- **Answer: A) Traffic Channel (TCH)**
17. **Which channel provides a reference frequency for mobile stations in GSM?**
- A) Frequency Correction Channel (FCCH)
- B) Synchronization Channel (SCH)
- C) Broadcast Control Channel (BCCH)
- D) Paging Channel (PCH)
- **Answer: A) Frequency Correction Channel (FCCH)**
18. **What information does the Broadcast Control Channel (BCCH) transmit in GSM?**
- A) Voice data
- B) Cell-specific information
- C) Authentication parameters
- D) Call notifications
- **Answer: B) Cell-specific information**
19. **Which channel is used for broadcasting time and frequency synchronization information in GSM?**
- A) Slow Associated Control Channel (SACCH)
- B) Fast Associated Control Channel (FACCH)
- C) Frequency Correction Channel (FCCH)
- D) Synchronization Channel (SCH)
- **Answer: D) Synchronization Channel (SCH)**
20. **What is the purpose of the Random Access Channel (RACH) in GSM?**
- A) To transmit voice data
- B) To request connection
- C) To broadcast cell identity information
- D) To provide synchronization information
- **Answer: B) To request connection**
21. **Which channel is responsible for sending the permanent International Mobile Subscriber Identity (IMSI) or the
temporary Mobile Subscriber Identity when a connection arrives to a mobile station in GSM?**
- A) Traffic Channel (TCH)
- B) Paging Channel (PCH)
- C) Standalone Dedicated Control Channel (SDCCH)
- D) Random Access Channel (RACH)
- **Answer: B) Paging Channel (PCH)**
22. **What is the primary function of the Access Grant Channel (AGCH) in GSM?**
- A) To assign traffic channels for voice transmission
- B) To allocate frequency resources for synchronization
- C) To assign standalone dedicated control channels in response to requests
- D) To provide synchronization information to mobile stations
- **Answer: A) To assign traffic channels for voice transmission**
23. **Which channel is used for the establishment and maintenance of connections to mobile stations in GSM?**
- A) Common Control Channel (CCCH)
- B) Dedicated Control Channel (DCCH)
- C) Traffic Channel (TCH)
- D) Broadcast Channel (BCH)
- **Answer: B) Dedicated Control Channel (DCCH)**
24. **What type of information does the Slow Associated Control Channel (SACCH) transmit in GSM?**
- A) Location area identity
- B) Voice data
- C) Power level changes
- D) Cell-specific information
- **Answer: C) Power level changes**
25. **Which channel is responsible for informing the mobile station about the frame number of the cell and Base Station
Identification Code (BSIC) in GSM?**
- A) Broadcast Control Channel (BCCH)
- B) Frequency Correction Channel (FCCH)
- C) Synchronization Channel (SCH)
- D) Standalone Dedicated Control Channel (SDCCH)
- **Answer: C) Synchronization Channel (SCH)**
26. **What is the function of the Cell Broadcast Channel (CBCH) in GSM?**
- A) To transmit voice data
- B) To provide synchronization information
- C) To broadcast cell identity information
- D) To broadcast messages from a service center to mobile stations
- **Answer: D) To broadcast messages from a service center to mobile stations**
28. **What type of information does the Broadcast Control Channel (BCCH) transmit in GSM?**
- A) Voice data
- B) Cell-specific information
- C) Authentication parameters
- D) Call notifications
- **Answer: B) Cell-specific information**
29. **Which channel provides a reference frequency for mobile stations in GSM?**
- A) Frequency Correction Channel (FCCH)
- B) Synchronization Channel (SCH)
- C) Broadcast Control Channel (BCCH)
- D) Paging Channel (PCH)
- **Answer: A) Frequency Correction Channel (FCCH)**
30. **What information does the Slow Associated Control Channel (SACCH) transmit in GSM?**
- A) Voice data
- B) Location area identity
- C) Power level changes
- D) Cell-specific information
- **Answer: C) Power level changes**
Lect 7
3. **What does the total power at the receiver antenna depend on?**
- A) Distance from the transmitter only
- B) Effective area of the receiver antenna only
- C) Distance from the transmitter and effective area of the receiver antenna
- D) Power of the receiver
- **Answer: C**
5. **Which formula represents the power density at a distance \(d\) from an isotropic antenna?**
- A) \( \frac{P_{Tx}}{4\pi d^2} \)
- B) \( \frac{P_{Tx}}{2\pi d^2} \)
- C) \( \frac{P_{Tx}}{4\pi d} \)
- D) \( \frac{P_{Tx}}{2\pi d} \)
- **Answer: A**
6. **Which decade saw the introduction of spectrum regulation to deal with interference?**
- A) 1900s
- B) 1920s
- C) 1930s
- D) 1940s
- **Answer: C**
7. **What was the primary use of mobile telephone service in the 1940s?**
- A) Commercial broadcasting
- B) Police and ambulance services
- C) Personal communication
- D) Military operations
- **Answer: B**
8. **What limits the number of users in old radio systems?**
- A) Limited power
- B) Limited frequency channels
- C) Large coverage areas
- D) Small antennas
- **Answer: B**
13. **Which reuse factor has the smallest interference among cells?**
- A) 3
- B) 4
- C) 7
- D) 9
- **Answer: D**
15. **What happens when the reuse factor is small in cellular systems?**
- A) More channels per cell
- B) More subscribers
- C) More interference
- D) All of the above
- **Answer: D**
16. **What does the receiver antenna effective area depend on in an isotropic antenna system?**
- A) Wavelength of the signal
- B) Distance from the transmitter
- C) Power of the transmitter
- D) Frequency of the signal
- **Answer: A**
17. **In a cellular network, what does setting up a call in a new cell and tearing down the old one refer to?**
- A) Handoff
- B) Roaming
- C) Frequency hopping
- D) Power control
- **Answer: A**
18. **Which technology allows adjacent cells to use the same frequencies?**
- A) FDMA
- B) TDMA
- C) CDMA
- D) GSM
- **Answer: C**
19. **What is the purpose of controlling power transmission levels in cellular networks?**
- A) To minimize inter-cell interference
- B) To maximize signal strength
- C) To reduce the number of cells
- D) To increase the number of channels
- **Answer: A**
20. **What was a significant limitation of the old mobile telephone service?**
- A) Limited number of channels
- B) High cost
- C) Complex technology
- D) Poor coverage
- **Answer: A**
21. **How is the received power \(P_{Rx}\) calculated in an isotropic antenna system?**
- A) \( \frac{P_{Tx} A_{Rx}}{4\pi d^2} \)
- B) \( \frac{P_{Tx} A_{Rx}}{2\pi d^2} \)
- C) \( \frac{P_{Tx} A_{Rx}}{4\pi d} \)
- D) \( \frac{P_{Tx} A_{Rx}}{2\pi d} \)
- **Answer: A**
22. **What defines the maximum distance at which a mobile can receive a signal from the transmission tower?**
- A) Cell coverage
- B) Frequency reuse
- C) Handoff procedure
- D) Receiver sensitivity
- **Answer: A**
23. **What happens to bit rate per channel when interference increases?**
- A) Increases
- B) Decreases
- C) Remains the same
- D) Fluctuates
- **Answer: B**
25. **What type of antenna cannot actually be built but is used as a theoretical model?**
- A) Directional antenna
- B) Dipole antenna
- C) Isotropic antenna
- D) Parabolic antenna
- **Answer: C**
27. **Which aspect of cellular networks allows for the increase in the number of users?**
- A) Higher power transmission
- B) Smaller cell size
- C) Frequency reuse
- D) Single frequency use
- **Answer: C**
29. **Which term describes the process of managing the transition between different cells?**
- A) Roaming
- B) Switching
- C) Handoff
- D) Frequency hopping
- **Answer: C**
30. **What component in the equation \(P(d) = \frac{P_{Tx}}{4\pi d^2}\) denotes the transmitter power?**
- A) \(P(d)\)
- B) \(P_{Tx}\)
- C) \(d\)
- D) \(\pi\)
- **Answer: B**
31. **What does \(A_{Rx}\) represent in the context of isotropic antennas?**
- A) Transmitter area
- B) Receiver area
- C) Effective area of the receiver antenna
- D) Total area of the antenna
- **Answer: C**
32. **Which of the following is a key advantage of using an isotropic antenna as a theoretical model?**
- A) High gain
- B) Simple design
- C) Uniform radiation pattern
- D) Low cost
- **Answer: C**
34. **Which factor does NOT influence the cell coverage area?**
- A) Transmitter power
- B) Receiver sensitivity
- C) Frequency of operation
- D) Number of users
- **Answer: D**
35. **What was the primary challenge with early mobile telephone systems?**
- A) Too many users
- B) Lack of frequency regulation
- C) Limited number of radio channels
- D) High interference levels
- **Answer: C**
36. **In the frequency reuse pattern shown, how many groups are the frequencies divided into?**
- A) 3
- B) 4
- C) 7
- D) 12
- **Answer: C**
37. **What is one of the key benefits of frequency reuse in cellular networks?**
- A) Increased power levels
- B) Reduced number of cells
- C) More efficient use of the spectrum
- D) Simplified network design
- **Answer: C**
38. **What is the relationship between cell size and the number of users in a cellular network?**
- A) Larger cells accommodate fewer users
- B) Smaller cells accommodate fewer users
- C) Larger cells accommodate more users
- D) Cell size does not affect the number of users
- **Answer: A**
39. **What is the main purpose of spectrum regulation introduced in the 1930s?**
- A) Increase the number of channels
- B) Decrease power levels
- C) Manage interference
- D) Improve signal quality
- **Answer: C**
43. **Which decade saw the commercial introduction of radio broadcast services?**
- A) 1900s
- B) 1920s
- C) 1930s
- D) 1940s
- **Answer: B**
49. **What is the primary function of the handoff process in cellular communication?**
- A) Increase power transmission
- B) Minimize interference
- C) Maintain call continuity
- D) Reduce cell size
- **Answer: C**
13. **In synchronous TDM, if a device does not have anything to transmit, its time slot:**
- a) Is given to another device
- b) Remains empty
- c) Is used for synchronization
- d) Is skipped
- **Answer: b) Remains empty**
14. **What happens in synchronous TDM when the number of time slots per frame equals the number of inputs?**
- a) Efficient bandwidth utilization
- b) Increased data loss
- c) Poor synchronization
- d) Increased data buffering
- **Answer: a) Efficient bandwidth utilization**
17. **In asynchronous TDM, the number of time slots per frame is:**
- a) Equal to the number of inputs
- b) Smaller than the number of inputs
- c) Larger than the number of inputs
- d) Variable
- **Answer: b) Smaller than the number of inputs**
2.048 Mbps**
### Miscellaneous
36. **Multiplexing allows for:**
- a) Higher transmission costs
- b) Sharing a transmission channel by several connections
- c) Increased interference
- d) Decreased channel capacity
- **Answer: b) Sharing a transmission channel by several connections**
37. **Significant economies of scale in multiplexing are achieved by:**
- a) Using more wires
- b) Combining many signals into one
- c) Increasing the number of poles
- d) Decreasing signal strength
- **Answer: b) Combining many signals into one**
40. **The North American digital hierarchy’s DS2 channel operates at:**
- a) 1.544 Mbps
- b) 6.312 Mbps
- c) 44.736 Mbps
- d) 274.176 Mbps
- **Answer: b) 6.312 Mbps**
48. **The DS3 channel in the North American hierarchy carries a bit rate of 6.312 Mbps.**
- a) True
- b) False
- **Answer: b) False**
49. **Asynchronous TDM is more efficient in bandwidth utilization compared to synchronous TDM.**
- a) True
- b) False
- **Answer: a) True**
2. **What bit patterns do the A1 and A2 octets use for frame synchronization?**
- A) A1 = 1111 0100, A2 = 0001 1000
- B) A1 = 1111 0110, A2 = 0010 1000
- C) A1 = 1110 0110, A2 = 0011 1000
- D) A1 = 1111 0111, A2 = 0010 1100
- **Answer: B**
4. **Which octet in SONET is used for parity checking on the previous frame?**
- A) B1
- B) B2
- C) H1
- D) K1
- **Answer: A**
11. **Which octet is used to verify the connection between section entities in SONET?**
- A) A1
- B) A2
- C) J0
- D) B1
- **Answer: C**
15. **What function do the D1, D2, and D3 octets serve in SONET?**
- A) Frame synchronization
- B) Parity checking
- C) Network management
- D) Path trace
- **Answer: C**
16. **How many nodes can there be on a SONET ring using the K1 and K2 octets?**
- A) 8
- B) 16
- C) 32
- D) 64
- **Answer: B**
20. **How many bits are used in the pointer field of the H1 and H2 octets?**
- A) 4 bits
- B) 10 bits
- C) 16 bits
- D) 24 bits
- **Answer: B**
21. **Which octet is used to carry a payload octet during a negative pointer adjustment in SONET?**
- A) H1
- B) H2
- C) H3
- D) K1
- **Answer: C**
24. **Which type of stuffing is used when the input is slower than the output in SONET?**
- A) Negative byte stuffing
- B) Positive byte stuffing
- C) Both positive and negative byte stuffing
- D) No stuffing is required
- **Answer: B**
26. **How many columns are there in the transport overhead of a SONET STS-1 frame?**
- A) 1 column
- B) 2 columns
- C) 3 columns
- D) 4 columns
- **Answer: C**
3. **Which octet in SONET is used for bit error monitoring on the previous frame?**
- A) B1
- B) B2
- C) H1
- D) K1
- **Answer: A**
12. **Which octet in SONET is used to send a payload octet during a negative pointer adjustment?**
- A) H1
- B) H2
- C) H3
- D) K1
- **Answer: C**
14. **What is the role of the H1, H2, and H3 octets in SONET?**
- A) Frame synchronization
- B) Pointer action
- C) Parity checking
- D) Path trace
- **Answer: B**
21. **Which octet in SONET is used for connection verification in the path layer?**
- A) J1
- B) J0
- C) B1
- D) H1
- **Answer: A**
27. **Which octet is used to indicate the status of the path layer in SONET?**
- A) S1
- B) G1
- C) J0
- D) F1
- **Answer: B**
30. **Which octet is responsible for indicating a path signal label in SONET?**
- A) C2
- B) J1
- C) B3
- D) H4
- **Answer: A**
1. **What is the primary role of transport networks?**
- a) Providing local area network connectivity
- b) Supporting high-speed connections for large-scale communication
- c) Serving as an internet service provider
- d) Managing personal computer networks
- **Answer:** b) Supporting high-speed connections for large-scale communication
8. **How does traffic flow in a two-fiber unidirectional path switched ring (UPSR)?**
- a) Clockwise only
- b) Counter-clockwise only
- c) Clockwise for working traffic and counter-clockwise for protection traffic
- d) In both directions simultaneously for both working and protection traffic
- **Answer:** c) Clockwise for working traffic and counter-clockwise for protection traffic
10. **What is a key feature of four-fiber bidirectional line switched rings (4-BLSR)?**
- a) Unidirectional transmission
- b) No protection against failures
- c) Bidirectional transmission
- d) Low complexity
- **Answer:** c) Bidirectional transmission
15. **What is a key requirement for all-optical backbone networks using WDM?**
- a) Manual restoration schemes
- b) Low reliability
- c) Protection schemes for high reliability
- d) Single wavelength transmission
- **Answer:** c) Protection schemes for high reliability
16. **What drives the fluctuating traffic patterns in transport networks?**
- a) Static user activity
- b) Random events only
- c) Human activity patterns
- d) Continuous system failures
- **Answer:** c) Human activity patterns
17. **What is a typical challenge on outlier days like Christmas for transport networks?**
- a) Decreased traffic
- b) Normal traffic levels
- c) Surges in traffic
- d) System shutdowns
- **Answer:** c) Surges in traffic
19. **What statistical model is used for call request arrival in transport networks?**
- a) Normal distribution
- b) Binomial distribution
- c) Poisson arrival process
- d) Uniform distribution
- **Answer:** c) Poisson arrival process
24. **Which topology offers better flexibility and efficiency than ring topologies in SONET?**
- a) Star topology
- b) Bus topology
- c) Mesh topology
- d) Tree topology
- **Answer:** c) Mesh topology
25. **What is one of the main purposes of protection switching in SONET networks?**
- a) To reduce latency
- b) To enhance data throughput
- c) To provide high reliability
- d) To increase signal quality
- **Answer:** c) To provide high reliability
27. **Which feature of 4-BLSR makes it suitable for high-speed backbone networks?**
- a) Low bandwidth efficiency
- b) Spatial re-use
- c) Unidirectional transmission
- d) Lack of redundancy
- **Answer:** b) Spatial re-use
29. **How does a 1:1 Linear APS differ from a 1+1 Linear APS?**
- a) 1:1 has no redundancy, while 1+1 is fully redundant
- b) 1:1 carries preemptible traffic on the protection line, while 1+1 does not
- c) 1:1 is unidirectional, while 1+1 is bidirectional
- d) 1:1 provides manual switching, while 1+1 provides automatic switching
- **Answer:** b) 1:1 carries preemptible traffic on the protection line, while 1+1 does not
33. **How quickly can SONET signaling restore transport connections in the event of a failure?**
- a) Within 1 second
- b) Within 10 seconds
- c) Within 100 milliseconds
- d) Within 50 milliseconds
- **Answer:** d) Within 50 milliseconds
35. **What type of protection is used in a two-fiber unidirectional path switched ring (UPSR)?**
- a) Span protection
- b) Link protection
- c) Path protection
- d) No protection
- **Answer:** c) Path protection
37. **In traffic management, what is the primary goal of traffic concentration?**
- a) To maximize the number of active calls
- b) To ensure call requests are always met
- c) To provide resources cost-effectively
- d) To eliminate all call blocking
- **Answer:** c) To provide resources cost-effectively
38. **What does the term "Poisson arrival process" describe in the context of network traffic?**
- a) The pattern of call terminations
- b) The random nature of call request arrivals
- c) The sequence of data packets
- d) The fixed interval of call requests
- **Answer:** b) The random nature of call request arrivals
39. **In the Erlang B formula, what does the variable 'a' represent?**
- a) The number of trunks
- b) The call request arrival rate
- c) The offered load in Erlangs
- d) The blocking probability
- **Answer:** c) The offered load in Erlangs
40. **What is one disadvantage of SONET ring topologies compared to mesh topologies?**
- a) Higher complexity
- b) Easier bandwidth management
- c) Distance limitations on ring size
- d) More flexible restoration schemes
- **Answer:** c) Distance limitations on ring size
44. **What is a major benefit of mesh topology over ring topology in SONET networks?**
- a) Simplicity in network design
- b) Flexibility and efficiency in interconnecting SONET streams
- c) No need for cross-connects
- d) Lower cost of implementation
- **Answer:** b) Flexibility and efficiency in interconnecting SONET streams
48. **What does the term "blocking probability" refer to in network traffic engineering?**
- a) The likelihood of a call being dropped
- b) The likelihood of a call being blocked due to all trunks being busy
- c) The probability of successful call setup
- d) The rate of data transfer in the network
- **Answer:** b) The likelihood of a call being blocked due to all trunks being busy
49. **What type of signaling is required for high-speed backbone networks using 4-BLSR?**
- a) Low complexity signaling
- b) High complexity signaling
- c) No signaling required
- d) Analog signaling
- **Answer:** b) High complexity signaling
50. **Which protection mechanism allows for the transmission of preemptible traffic on the protection line?**
- a) 1+1 APS
- b) 1:1 APS
- c) 1:N APS
- d) None of the above
- **Answer:** b) 1:1 APS
51. **How does the presence of multiple rings impact the complexity of a SONET network?**
- a) It simplifies network management
- b) It has no impact on network complexity
- c) It increases the complexity of managing the network
- d) It eliminates the need for protection mechanisms
- **Answer:** c) It increases the complexity of managing the network
52. **What is one of the benefits of using optical ADMs in WDM networks?**
- a) Lower data rates
- b) Reduced reliability
- c) Ability to insert and drop wavelengths
- d) Decreased network flexibility
- **Answer:** c) Ability to insert and drop wavelengths
54. **Which type of network topology is described as more flexible and efficient than rings?**
- a) Star topology
- b) Bus topology
- c) Mesh topology
- d) Ring topology
- **Answer:** c) Mesh topology
59. **Which network topology is suitable for lower-speed access networks according to the UPSR properties?**
- a) Two-fiber bidirectional ring
- b) Four-fiber bidirectional ring
- c) Two-fiber unidirectional path switched ring
- d) Mesh topology
- **Answer:** c) Two-fiber unidirectional path switched ring
60. **What is the primary advantage of the 1+1 Linear Automatic Protection Switching?**
- a) Low bandwidth utilization
- b) Simultaneous transmission over diverse routes for high reliability
- c) Reduced network cost
- d) Manual switching in response to signal degradation
- **Answer:** b) Simultaneous transmission over diverse routes for high reliability
Lect 10
6. **In RED, packets are discarded before the buffer is full to:**
- A) Reduce network congestion
- B) Increase buffer size
- C) Prioritize new packets
- D) Ensure all packets are transmitted
- **Answer: A**
14. **In Earliest Due Date Scheduling, packets with no delay requirements get:**
- A) Highest priority
- B) Earliest due dates
- C) Indefinite or very long due dates
- D) Same priority as other packets
- **Answer: C**
15. **Earliest Due Date Scheduling is designed to prioritize packets requiring:**
- A) Low delay
- B) Large buffer size
- C) High bandwidth
- D) Minimal transmission time
- **Answer: A**
20. **The finishing time of a packet arriving to an idle queue in Fair Queueing is:**
- A) Round number + packet size in bits
- B) Round number + queue length
- C) Round number + buffer size
- D) Round number + transmission rate
- **Answer: A**
21. **The finishing time of a packet arriving to an active queue in Fair Queueing is:**
- A) Finishing time of last packet + packet size
- B) Finishing time of last packet + queue length
- C) Finishing time of last packet + buffer size
- D) Finishing time of last packet + transmission rate
- **Answer: A**
#### Weighted Fair Queueing (WFQ)
22. **In WFQ, packets are sorted according to:**
- A) Arrival time
- B) Packet size
- C) Assigned weight
- D) Completion time in an ideal system
- **Answer: D**
31. **Variation in FIFO queueing based on queue thresholds can result in:**
- A) Higher loss for some packet flows
- B) Lower delay for all packet flows
- C) Equal treatment for all packets
- D) Increased buffer size
- **Answer: A**
of the above
- **Answer: D**
38. **In Bit-by-Bit Fair Queueing, if each queue gets 1 bit per cycle, the round number represents:**
- A) Number of packets transmitted
- B) Number of active queues
- C) Total queue length
- D) Buffer size
- **Answer: B**
45. **In RED, if the average queue length is between the minimum and maximum threshold, packets are:**
- A) Always dropped
- B) Never dropped
- C) Dropped according to a probability
- D) Prioritized for transmission
- **Answer: C**
50. **In Bit-by-Bit Fair Queueing, the service rate is determined by:**
- A) Number of packets in the queue
- B) Buffer size
- C) Packet size
- D) Round number and queue activity
- **Answer: D**