Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Goel Institute of Technology & Management

Department of Electrical and Electronics Engineering


Subject: Wireless and Mobile Communication (REC 085)
Faculty: Ranjan Das Bagh
Tutorial Sheet 4 based on MCQ
1. Frequency division duplexing provides ________ distinct bands of frequencies for _________
user.
a) Two, two
b) One, two
c) Two, one
d) Two, many
Answer: c
Explanation: Frequency division duplexing (FDD) provides two distinct bands of
frequencies for every user. In FDD, any duplex channel actually consists of two simplex
channels.

2. The forward band in FDD provides traffic from the mobile to base station.
a) True
b) False
Answer: b
Explanation: The forward band in FDD provides traffic from the base station to the mobile.
The reverse band provides traffic from the mobile to the base station.

3. The frequency separation between each forward and reverse channel changes throughout
the system.
a) True
b) False
Answer: b
Explanation: The frequency separation between each forward and reverse channel is
constant throughout the system. It is regardless of the particular channel being used. A
device called a duplexer is used inside each subscriber unit and base station to allow
simultaneous bidirectional radio transmission.

4. Time division duplexing uses ________ to provide both a forward and reverse link.
a) Frequency
b) Time
c) Time and frequency
d) Cell spacing
Answer: b
Explanation: Time division duplexing (TDD) uses time instead of frequency to provide both
a forward and reverse link. In TDD, multiple users share a single radio channel by taking
turns in the time domain.

5. TDD is effective for _________


a) Fixed wireless access and users are stationary
b) Dynamic wireless access and users are stationary
c) Fixed wireless access and users are moving
d) Dynamic wireless access and users are moving
answer: a
Explanation: TDD is effective for fixed wireless access when all users are stationary. This
makes the propagation delay does not vary in time among the users. Because of rigid
timing required for time slotting, TDD generally is limited to cordless phone or short range
potable access.

6. In wideband systems, the transmission bandwidth of a single channel _________ coherence


bandwidth of the channel.
a) Equal to
b) Not related to
c) Larger than
d) Smaller than
Answer: c
Explanation: In wideband systems, the transmission bandwidth of a single channel is much
larger than the coherence bandwidth of the channel. Thus, multipath fading does not
greatly vary the received signal power within a wideband channel.

7. In narrowband system, the channels are usually operated using TDD.


a) True
b) False
Answer: b
Explanation: In narrowband system, channels are usually operated using FDD. To minimize
interference between forward and reverse links on each channel, the frequency separation
is made as great as possible within the frequency spectrum.

8. Narrowband FDMA allows users to share the same radio channel allocating a unique time
slot to each user.
a) True
b) False
Answer: b
Explanation: In narrowband FDMA, a user is assigned a particular channel which is not
shared by other users in the vicinity. However narrowband TDMA allows the users to share
the same radio channel allocating a unique time slot to each user.

9. During the period of call, other users can share the same channel in FDMA.
a) True
b) False
Answer: b
Explanation: In FDMA systems, no other user can share the same channel during the
period of call. In FDD systems, the users are assigned a channel as a pair of frequencies;
one is used for the forward channel while the other frequency is used for the reverse
channel.

10. The FDMA channel carries ____________ phone circuit at a time.


a) Ten
b) Two
c) One
d) Several
Answer: c
Explanation: The FDMA channel carries one phone circuit at a time. Each individual band or
channel is wide enough to accommodate the signal spectra of the transmissions to be
propagated.

11. If the FDMA channel is not in use, it can be used by other users.
a) True
b) False
Answer: b
Explanation: If an FDMA channel is not in use, it sits idle and cannot be used by other users
to increase or share capacity. It is essentially a wasted resource.

12. 5. The bandwidth of FDMA channel is ______


a) Wide
b) Narrow
c) Large
d) Zero
Answer: b
Explanation: The bandwidth of FDMA channels is relatively narrow as each channel
supports only one circuit per carrier. That is, FDMA is usually implemented in narrow band
systems.

13. 6. The symbol time in FDMA systems is _________ thus intersymbol interference is ______
a) Large, high
b) Small, low
c) Small, high
d) Large, low
Answer: d
Explanation: The symbol time of a narrowband signal is large as compared to the average
delay spread. This implies that the amount of intersymbol interference is low and, thus,
little or no equalization is required in FDMA narrowband systems.

14. Due to _________ transmission scheme __________ bits are needed for overhead in FDMA
systems.
a) Continuous, few
b) Discontinuous, few
c) Continuous, many
d) Discontinuous, many
Answer: a
Explanation: Since FDMA is a continuous transmission scheme, fewer bits are needed for
overhead purposes (such as synchronization and framing bits) as compared to TDMA.

15. Which of the following is not true for FDMA systems as compared to TDMA systems?
a) Low complexity
b) Lower cell site system cost
c) Tight RF filtering
d) Narrow bandwidth
Answer: b
Explanation: FDMA systems have higher cell site system costs as compared to TDMA
systems. It is due to single channel per carrier design, and the need to use costly bandpass
filters to eliminate spurious radiation at the base station.

16. __________ is undesired RF radiation.


a) Intermodulation frequency
b) Intermediate frequency
c) Instantaneous frequency
d) Instrumental frequency
Answer: a
Explanation: Intermodulation (IM) frequency is undesired RF radiation which can interfere
with other channels in the FDMA systems. The nonlinearities cause signal spreading in the
frequency domain and generate IM frequency.

17. __________ is based on FDMA/FDD.


a) GSM
b) W-CDMA
c) Cordless telephone
d) AMPS
Answer: d
Explanation: The first US analog cellular system, the Advanced Mobile Phone System
(AMPS) is based on FDMA/FDD. A single user occupies a single channel while the call is in
progress.

18. In US AMPS, 416 channels are allocated to various operators with 10 kHz guard band and
channel between them is 30 kHz. What is the spectrum allocation given to each operator?
a) 12.5 kHz
b) 30 kHz
c) 12.5 MHz
d) 30 MHz
Answer: c
Explanation: Spectrum allocated to each cellular operator is 12.5 MHz. As B t = NBc + 2Bguard;
which is equal to 416*30*103+2(10*103) = 12.5 MHz.

19. Preamble contains __________


a) Address
b) Data
c) Guard bits
d) Trail bits
Answer: a
Explanation: TDMA frame is made up of a preamble, an information message and the trail
bits. In a TDMA frame, the preamble contains the address and synchronization information
that both the base station and the subscribers use to identify each other.

20. __________ are utilized to allow synchronization of the receivers between different slots and
frames.
a) Preamble
b) Data
c) Guard bits
d) Trail bits
Answer: c
Explanation: Guard times are utilized to allow synchronization of the receivers between
different slots and frames. TDMA/FDD systems intentionally induce several time slots of
delay between the forward and reverse time slots for a particular user.

21. Which of the following is not true for TDMA?


a) Single carrier frequency for single user
b) Discontinuous data transmission
c) No requirement of duplexers
d) High transmission rates
Answer: a
Explanation: TDMA share a single carrier frequency with several users, where each user
makes use of non-overlapping time slots. The number of time slots per frame depends on
several factors, such as modulation technique, available bandwidth etc.

22. Because of _______ transmissions in TDMA, the handoff process in __________


a) Continuous, complex
b) Continuous, simple
c) Discontinuous, complex
d) Discontinuous, simple
Answer: d
Explanation: Because of discontinuous transmissions in TDMA, the handoff process is
much simpler for a subscriber unit, since it is able to listen for other base stations during
idle time slots.

23. __________ synchronization overhead is required in TDMA due to _______ transmission.


a) High, burst
b) High, continuous
c) Low, burst
d) No, burst
Answer: a
Explanation: High synchronization overhead is required in TDMA systems because of burst
transmissions. TDMA transmissions are slotted, and this requires the receivers to be
synchronized for each data burst.
24. 7. TDMA allocates a single time per frame to different users.
a) True
b) False
Answer: b
Explanation: TDMA has an advantage that it can allocate different numbers of time slots
per frame to different users. Thus, bandwidth can be supplied on demand to different
users by concatenating or reassigning time slots based on priority.

25. ___________ of TDMA system is a measure of the percentage of transmitted data that
contains information as opposed to providing overhead for the access scheme.
a) Efficiency
b) Figure of merit
c) Signal to noise ratio
d) Mean
Answer: a
Explanation: Efficiency of TDMA system is a measure of the percentage of transmitted data
that contains information as opposed to providing overhead for the access scheme. The
frame efficiency is the percentage of bits per frame which contain transmitted data.

26. A TDMA system uses 25 MHz for the forward link, which is broken into radio channels of
200 kHz. If 8 speech channels are supported on a single radio channel, how many
simultaneous users can be accommodated?
a) 25
b) 200
c) 1600
d) 1000
Answer: d
Explanation: For a TDMA system that uses 25 MHz for the forward link, which is broken
into radio channels of 200 kHz. If 8 speech channels are supported on a single radio
channel, 1000 simultaneous users can be accommodated as N = (25 MHz)/(200 kHz/8).

27. What is the time duration of a bit if data is transmitted at 270.833 kbps in the channel?
a) 270.833 s
b) 3 μs
c) 3.692 μs
d) 3.692 s
Answer: c
Explanation: If data is transmitted at 270.833 kbps in the channel, the time duration of a bit
will be 3.692 μs, as Tb = (1/270.833 kbps) = 3.692 μs.

28. SSMA uses signals which have a transmission bandwidth that is smaller than the minimum
required RF bandwidth.
a) True
b) False
Answer: b
Explanation: Spread spectrum multiple access (SSMA) uses signals which have a
transmission bandwidth that is several orders of magnitude greater than the minimum
required RF bandwidth.
29. PN sequence converts _______ signal to ______ signal.
a) Narrowband, wideband
b) Wideband, narrowband
c) Unmodulated, modulated
d) Low frequency, high frequency
Answer: a
Explanation: A pseudo-noise (PN) sequence converts a narrowband signal to a wideband
noise like signal before transmission. SSMA provides immunity to multipath interference
and robust multiple access capability.

30. SSMA is bandwidth efficient when used with a single user.


a) True
b) False
Answer: b
Explanation: SSMA is not very bandwidth efficient when used by a single user. However,
since many users can share the same spread spectrum bandwidth without interfering with
one another, spread spectrum systems become bandwidth efficient in a multiple user
environment.

31. ___________ is a digital multiple access system in which carrier frequencies are varied in
pseudorandom order.
a) CDMA
b) FCDMA
c) FHMA
d) SDMA
Answer: c
Explanation: Frequency hopped multiple access (FHMA) is a digital multiple access system
in which the carrier frequencies of the individual users are varied in a pseudorandom
fashion within a wideband channel.

32. If the rate of change of the carrier frequency is greater than the symbol rate, then the
system is referred as ___________
a) Fast frequency hopping system
b) Slow frequency hopping system
c) Time division frequency hopping system
d) Code division multiple access system
Answer: a
Explanation: If the rate of change of the carrier frequency is greater than the symbol rate,
then the system is referred as a fast frequency hopping system. If the channel changes at a
rate less than or equal to the symbol rate, it is called slow frequency hopping.

33. A frequency hopped system does not provide security.


a) True
b) False
Answer: b
Explanation: A frequency hopped system provides a level of security, especially when a
large number of channels are used. Since, an unintended receiver that does not know the
pseudorandom sequence of frequency slots must retune rapidly to search for the signal it
wishes to intercept.

34. All users in CDMA system uses __________ carrier frequency.


a) Different
b) Two
c) Ten
d) Same
Answer: d
Explanation: All users in CDMA system use the same carrier frequency and may transmit
simultaneously. Each user has its own pseudorandom codeword which is approximately
orthogonal to all other codewords.

35. ___________ problem occurs when many mobile users share the same channel.
a) Near-far
b) Activation
c) Line of sight
d) Windowing
Answer: a
Explanation: The near far problem occurs when many mobile users share the same
channel. In general, the strongest received mobile signal will capture the demodulator at a
base station.

36. In CDMA, symbol duration is ___________ than channel delay spread.


a) Equal
b) Greater
c) Slightly greater
d) Much less
Answer: d
Explanation: In CDMA, symbol (chip) duration is very short and usually much less than the
channel delay spread. Thus, channel data rates are very high in CDMA systems.

37. ____________ is used to improve reception by collecting time delayed versions of the
required signal.
a) RAKE receiver
b) Equalizer
c) Frequency modulator
d) High pass filter
Answer: a
Explanation: A RAKE receiver can be used to improve reception by collecting time delayed
versions of the required signals. Since PN sequences have low autocorrelation, multipath
which is delayed by more than a chip appear as noise.

38. ____________ arises from the fact that the spreading sequences of different users are not
orthogonal.
a) Near-far problem
b) Line of sight
c) Windowing
d) Self jamming
Answer: d
Explanation: Self jamming arises from the fact that the spreading sequences of different
users are not orthogonal. Hence, in the despreading of a particular PN code, non zero
contributions to the receiver decision statistic for the desired user arise from the
transmissions of other users in the system.

39. Packet radio uses _________ and __________ signals for perfect feedback.
a) Forward, reverse
b) ACK, NACK
c) Active, passive
d) Linear, non linear
Answer: b
Explanation: Packet radio uses ACK and NACK signals for perfect feedback. The ACK signal
indicates an acknowledgment of a received burst and NACK indicates that the previous
burst was not received correctly by base station.

40. Packet radio has high spectral efficiency.


a) True
b) False
Answer: b
Explanation: Packet radio multiple access is very easy to implement, but has low spectral
efficiency and may induce delays. The subscriber uses a contention technique to transmit
on a common channel.

41. ___________ is defined as average number of messages successfully transmitted per unit
time in packet radio multiple access technique.
a) Average delay
b) Figure of merit
c) Throughput
d) Efficiency
Answer: c
Explanation: The performance of contention technique can be evaluated by the
throughput (T), which is defined as the average number of messages successfully
transmitted per unit time, and the average delay experienced by a typical message burst.

42. What is the time period during which the packets are susceptible to collisions with
transmissions from other users?
a) Delay time
b) Latency period
c) Average delay time
d) Vulnerable period
Answer: d
Explanation: Vulnerable period is the time period during which the packets are susceptible
to collisions with transmissions from other users. It is used in order to determine the
throughput.
43. For a PR multiple access technique, packet transmissions occur with __________ distribution.
a) Poisson
b) Gaussian
c) Pearson
d) Rayleigh
Answer: a
Explanation: For a PR multiple access technique, packet transmissions occur with Poisson
distribution. To study packet radio protocols, it is assumed that all packets sent by all users
have a constant packet length and fixed channel rate.

44. If λ is mean arrival rate and τ is the packet duration, then traffic occupancy of a packet
radio network is equal to _________
a) λτ
b) λ/τ
c) λ-τ
d) λτ2
Answer: a
Explanation: If λ is mean arrival rate and τ is the packet duration, then traffic occupancy or
throughput of a packet radio network is equal to λτ. The unit of R is in Erlangs.

45. Pure ALOHA is __________


a) Modulation technique
b) Multiple access technique
c) Random access technique
d) Spread spectrum technique
Answer: c
Explanation: The pure ALOHA protocol is a random access protocol used for data transfer.
A user accesses a channel as soon as a message is ready to be transmitted.

46. For pure ALOHA protocol, the vulnerable period is ___________ the packet duration.
a) Double
b) Equal
c) Ten times
d) Not equal
Answer: a
Explanation: For the pure ALOHA protocol, the vulnerable period is double the packet
duration. After a transmission, the user waits for an acknowledgement on either the same
channel or a separate feedback channel.

47. The vulnerable period of slotted ALOHA is _________ packet duration.


a) Two
b) Ten
c) One
d) Three
Answer: c
Explanation: The vulnerable period of slotted ALOHA is one packet duration. Since, partial
collisions are prevented through synchronization.
48. In slotted ALOHA, time is divided into different length of time slots.
a) True
b) False
Answer: b
Explanation: In slotted ALOHA, time is divided into equal time slots of length greater than
the packet duration. The subscribers each have synchronized clocks and transmit a
message only at the beginning of a new time slot.

49. CSMA stands for _________


a) Carrier sense multiple access
b) Code sense multiple access
c) Carrier sense modulation access
d) Carry sense multiple access
Answer: a
Explanation: CSMA stands for carrier sense multiple access. CSMA protocol is based on the
fact that each terminal on the network is able to monitor the status of the channel before
transmitting information.

50. __________ is the time required for a terminal to sense whether or not the channel is idle.
a) Propagation delay
b) Average delay
c) Detection delay
d) Time delay
Answer: c
Explanation: In CSMA protocols, detection delay and propagation delay are two important
parameters. Detection delay is a function of the receiver hardware and is the time required
for a terminal to sense whether or not the channel is idle.

51. Which of the following is based on time division multiplexing?


a) Slotted ALOHA
b) Pure ALOHA
c) CSMA
d) Reservation ALOHA
Answer: d
Explanation: Reservation ALOHA is a packet access scheme based on time division
multiplexing. In this protocol, certain packet slots are assigned with priority, and it is
possible for users to reserve slots for the transmission of packets.

52. Discrete packet time technique, PRMA stands for _________


a) Packet reservation multiple access
b) Photo reflector multiple access
c) Proton reflector modulating access
d) Packet reflection multiple access
Answer: a
Explanation: PRMA stands for Packet Reservation Multiple Access. PRMA uses a discrete
packet time technique similar to reservation ALOHA and combines the cyclical frame
structure of TDMA in a manner that allows each TDMA time slot to carry either voice or
data, where voice is the priority.

You might also like