This set of Software Defined Radio Architecture Questions and Answers for Aptitude test focuses on “Essential Function of Software Radio”.
1. Which of the following is not a part of the channel encoder/decoder section in the functional model of software defined radio?
a) RF/Channel access
b) Source coding
c) IF processing
Explanation: The channel encoder/decoder section comprises of RF/Channel access, IF processing, and modem. RF/Channel access includes antenna and RF conversion. IF processing stage includes filtering, and frequency translation. Modem is responsible for waveform definition.
2. ____ may include digital beam forming.
c) Channel access
d) IF processing
Explanation: IF processing may include filtering, frequency translation, digital beam forming, joint space time equalization, integration of space diversity and frequency diversity.
3. ____ connects sources that are physically remote from the radio node.
b) RF/Channel access
c) Network support
d) Communication services
Explanation: The sources, which are physically remote from the radio node, are connected via Synchronous Digital Hierarchy, Local Area Network or other networks to the radio node by service and network support.
4. Joint control may grow towards autonomous selection of ____ and ____
a) band, mode
b) band, personality
c) mode, personality
d) personality, protocol
Explanation: Joint control may grow towards autonomous selection of band, mode, and data format. Joint control guarantees system stability, error recovery, and isochronous streaming of voice and video.
5. _____ is essential to ensure that the required resources do not exceed the available resources of a radio platform.
a) Joint control
b) Host processor
c) Host controller
d) Evolution support
Explanation: Evolution support is essential to ensure that the required resources do not exceed the available resources of a radio platform. It monitors the definition and download process of waveform personalities. It also verifies whether a personality is safe for activation.
6. ____ ensures data integrity.
c) Network support
d) Source coding
Explanation: Information security operations such as authentication and stream enciphering ensure data integrity. Further, authentication reduces fraud and stream enciphering assures privacy.
7. ____ device allows inclusion of new hardware components without external physical intervention.
b) Plug and Play
Explanation: Plug and Play device facilitate the inclusion of hardware components without physical configuration or external user intervention. A challenge posed by plug and play modules is the definition of interface points.
8. Which of the following is not characteristic of a plug and play module?
Explanation: The plug and play module must be compatible with radio environment. It must be controllable under defined module and have predictive usage of resources.
9. ____ must preserve radio service-defining properties of the system.
a) Module control
b) Module composition
c) Joint control
d) Joint composition
Explanation: Module composition must preserve radio service-defining properties of the system. It prevents erroneous results from being generated on control commands. It also ensures proper consumption of computational resources.
10. Digital translation of a baseband signal into an IF is an example for ____
a) continuous-time point operation
b) continuous-frequency point operation
c) discrete-time point operation
d) discrete-frequency point operation
Explanation: Digital translation of a baseband signal into an IF is an example for Discrete-time point operation. Discrete-time point operation involves the multiplication of discrete time-domain baseband waveform by a discrete reference carrier to give sampled in-phase IF waveform.
11. Which among the following is not a property of offline software support?
a) System analysis
b) Air interface modes
c) Re-hosting of hardware
d) Signal processing
Explanation: System analysis, re-hosting existing software on new hardware, and advanced signal processing are properties of offline software support. It is achieved by prototyping and linking with channel processing streams. It also allows debugging of algorithms.
12. How are the bits at the output of INFOSEC (towards source) stage referred?
a) Black bits
b) Shielded bits
c) White bits
d) Clear bits
Explanation: The bits at the output of INFOSEC are referred to as clear bits. These are then operated on to give network or source bits. Network bits comply with network protocols and the source bits are passed to source decoder.
13. _____ stream characterizes radio surrounding usage in terms of time, frequency, and space.
a) Online adaption
b) Offline adaption
c) Environment management
d) Real-time channel processing
Explanation: Environment management stream characterizes radio surrounding usage in terms of time, frequency, and space. It also includes channel identification and estimation of channel interference levels.
14. Digital-access bandwidth is approximately double of the sampling rate of the ADC in the isochronous subscriber signal-processing path.
Explanation: Digital-access bandwidth is approximately half of the sampling rate of the ADC in the isochronous subscriber signal-processing path. Digital access bandwidth and degree of flexibility are two important parameters of a software defined radio.
15. The introduction of plug and play modules in software defined radio involves partitioning of functions and components
Explanation: A partition should ensure clear matching of functions to components. The physical interfaces among components must correspond to logical interfaces among functions.
Sanfoundry Global Education & Learning Series – Software Defined Radio.
To practice all areas of Software Defined Radio Architecture for Aptitude test, here is complete set of 1000+ Multiple Choice Questions and Answers.