Professional Documents
Culture Documents
REC085 t4 Sheet
REC085 t4 Sheet
2. The forward band in FDD provides traffic from the mobile to base station.
a) True
b) False
Answer: b
Explanation: The forward band in FDD provides traffic from the base station to the mobile.
The reverse band provides traffic from the mobile to the base station.
3. The frequency separation between each forward and reverse channel changes throughout
the system.
a) True
b) False
Answer: b
Explanation: The frequency separation between each forward and reverse channel is
constant throughout the system. It is regardless of the particular channel being used. A
device called a duplexer is used inside each subscriber unit and base station to allow
simultaneous bidirectional radio transmission.
4. Time division duplexing uses ________ to provide both a forward and reverse link.
a) Frequency
b) Time
c) Time and frequency
d) Cell spacing
Answer: b
Explanation: Time division duplexing (TDD) uses time instead of frequency to provide both
a forward and reverse link. In TDD, multiple users share a single radio channel by taking
turns in the time domain.
8. Narrowband FDMA allows users to share the same radio channel allocating a unique time
slot to each user.
a) True
b) False
Answer: b
Explanation: In narrowband FDMA, a user is assigned a particular channel which is not
shared by other users in the vicinity. However narrowband TDMA allows the users to share
the same radio channel allocating a unique time slot to each user.
9. During the period of call, other users can share the same channel in FDMA.
a) True
b) False
Answer: b
Explanation: In FDMA systems, no other user can share the same channel during the
period of call. In FDD systems, the users are assigned a channel as a pair of frequencies;
one is used for the forward channel while the other frequency is used for the reverse
channel.
11. If the FDMA channel is not in use, it can be used by other users.
a) True
b) False
Answer: b
Explanation: If an FDMA channel is not in use, it sits idle and cannot be used by other users
to increase or share capacity. It is essentially a wasted resource.
13. 6. The symbol time in FDMA systems is _________ thus intersymbol interference is ______
a) Large, high
b) Small, low
c) Small, high
d) Large, low
Answer: d
Explanation: The symbol time of a narrowband signal is large as compared to the average
delay spread. This implies that the amount of intersymbol interference is low and, thus,
little or no equalization is required in FDMA narrowband systems.
14. Due to _________ transmission scheme __________ bits are needed for overhead in FDMA
systems.
a) Continuous, few
b) Discontinuous, few
c) Continuous, many
d) Discontinuous, many
Answer: a
Explanation: Since FDMA is a continuous transmission scheme, fewer bits are needed for
overhead purposes (such as synchronization and framing bits) as compared to TDMA.
15. Which of the following is not true for FDMA systems as compared to TDMA systems?
a) Low complexity
b) Lower cell site system cost
c) Tight RF filtering
d) Narrow bandwidth
Answer: b
Explanation: FDMA systems have higher cell site system costs as compared to TDMA
systems. It is due to single channel per carrier design, and the need to use costly bandpass
filters to eliminate spurious radiation at the base station.
18. In US AMPS, 416 channels are allocated to various operators with 10 kHz guard band and
channel between them is 30 kHz. What is the spectrum allocation given to each operator?
a) 12.5 kHz
b) 30 kHz
c) 12.5 MHz
d) 30 MHz
Answer: c
Explanation: Spectrum allocated to each cellular operator is 12.5 MHz. As B t = NBc + 2Bguard;
which is equal to 416*30*103+2(10*103) = 12.5 MHz.
20. __________ are utilized to allow synchronization of the receivers between different slots and
frames.
a) Preamble
b) Data
c) Guard bits
d) Trail bits
Answer: c
Explanation: Guard times are utilized to allow synchronization of the receivers between
different slots and frames. TDMA/FDD systems intentionally induce several time slots of
delay between the forward and reverse time slots for a particular user.
25. ___________ of TDMA system is a measure of the percentage of transmitted data that
contains information as opposed to providing overhead for the access scheme.
a) Efficiency
b) Figure of merit
c) Signal to noise ratio
d) Mean
Answer: a
Explanation: Efficiency of TDMA system is a measure of the percentage of transmitted data
that contains information as opposed to providing overhead for the access scheme. The
frame efficiency is the percentage of bits per frame which contain transmitted data.
26. A TDMA system uses 25 MHz for the forward link, which is broken into radio channels of
200 kHz. If 8 speech channels are supported on a single radio channel, how many
simultaneous users can be accommodated?
a) 25
b) 200
c) 1600
d) 1000
Answer: d
Explanation: For a TDMA system that uses 25 MHz for the forward link, which is broken
into radio channels of 200 kHz. If 8 speech channels are supported on a single radio
channel, 1000 simultaneous users can be accommodated as N = (25 MHz)/(200 kHz/8).
27. What is the time duration of a bit if data is transmitted at 270.833 kbps in the channel?
a) 270.833 s
b) 3 μs
c) 3.692 μs
d) 3.692 s
Answer: c
Explanation: If data is transmitted at 270.833 kbps in the channel, the time duration of a bit
will be 3.692 μs, as Tb = (1/270.833 kbps) = 3.692 μs.
28. SSMA uses signals which have a transmission bandwidth that is smaller than the minimum
required RF bandwidth.
a) True
b) False
Answer: b
Explanation: Spread spectrum multiple access (SSMA) uses signals which have a
transmission bandwidth that is several orders of magnitude greater than the minimum
required RF bandwidth.
29. PN sequence converts _______ signal to ______ signal.
a) Narrowband, wideband
b) Wideband, narrowband
c) Unmodulated, modulated
d) Low frequency, high frequency
Answer: a
Explanation: A pseudo-noise (PN) sequence converts a narrowband signal to a wideband
noise like signal before transmission. SSMA provides immunity to multipath interference
and robust multiple access capability.
31. ___________ is a digital multiple access system in which carrier frequencies are varied in
pseudorandom order.
a) CDMA
b) FCDMA
c) FHMA
d) SDMA
Answer: c
Explanation: Frequency hopped multiple access (FHMA) is a digital multiple access system
in which the carrier frequencies of the individual users are varied in a pseudorandom
fashion within a wideband channel.
32. If the rate of change of the carrier frequency is greater than the symbol rate, then the
system is referred as ___________
a) Fast frequency hopping system
b) Slow frequency hopping system
c) Time division frequency hopping system
d) Code division multiple access system
Answer: a
Explanation: If the rate of change of the carrier frequency is greater than the symbol rate,
then the system is referred as a fast frequency hopping system. If the channel changes at a
rate less than or equal to the symbol rate, it is called slow frequency hopping.
35. ___________ problem occurs when many mobile users share the same channel.
a) Near-far
b) Activation
c) Line of sight
d) Windowing
Answer: a
Explanation: The near far problem occurs when many mobile users share the same
channel. In general, the strongest received mobile signal will capture the demodulator at a
base station.
37. ____________ is used to improve reception by collecting time delayed versions of the
required signal.
a) RAKE receiver
b) Equalizer
c) Frequency modulator
d) High pass filter
Answer: a
Explanation: A RAKE receiver can be used to improve reception by collecting time delayed
versions of the required signals. Since PN sequences have low autocorrelation, multipath
which is delayed by more than a chip appear as noise.
38. ____________ arises from the fact that the spreading sequences of different users are not
orthogonal.
a) Near-far problem
b) Line of sight
c) Windowing
d) Self jamming
Answer: d
Explanation: Self jamming arises from the fact that the spreading sequences of different
users are not orthogonal. Hence, in the despreading of a particular PN code, non zero
contributions to the receiver decision statistic for the desired user arise from the
transmissions of other users in the system.
39. Packet radio uses _________ and __________ signals for perfect feedback.
a) Forward, reverse
b) ACK, NACK
c) Active, passive
d) Linear, non linear
Answer: b
Explanation: Packet radio uses ACK and NACK signals for perfect feedback. The ACK signal
indicates an acknowledgment of a received burst and NACK indicates that the previous
burst was not received correctly by base station.
41. ___________ is defined as average number of messages successfully transmitted per unit
time in packet radio multiple access technique.
a) Average delay
b) Figure of merit
c) Throughput
d) Efficiency
Answer: c
Explanation: The performance of contention technique can be evaluated by the
throughput (T), which is defined as the average number of messages successfully
transmitted per unit time, and the average delay experienced by a typical message burst.
42. What is the time period during which the packets are susceptible to collisions with
transmissions from other users?
a) Delay time
b) Latency period
c) Average delay time
d) Vulnerable period
Answer: d
Explanation: Vulnerable period is the time period during which the packets are susceptible
to collisions with transmissions from other users. It is used in order to determine the
throughput.
43. For a PR multiple access technique, packet transmissions occur with __________ distribution.
a) Poisson
b) Gaussian
c) Pearson
d) Rayleigh
Answer: a
Explanation: For a PR multiple access technique, packet transmissions occur with Poisson
distribution. To study packet radio protocols, it is assumed that all packets sent by all users
have a constant packet length and fixed channel rate.
44. If λ is mean arrival rate and τ is the packet duration, then traffic occupancy of a packet
radio network is equal to _________
a) λτ
b) λ/τ
c) λ-τ
d) λτ2
Answer: a
Explanation: If λ is mean arrival rate and τ is the packet duration, then traffic occupancy or
throughput of a packet radio network is equal to λτ. The unit of R is in Erlangs.
46. For pure ALOHA protocol, the vulnerable period is ___________ the packet duration.
a) Double
b) Equal
c) Ten times
d) Not equal
Answer: a
Explanation: For the pure ALOHA protocol, the vulnerable period is double the packet
duration. After a transmission, the user waits for an acknowledgement on either the same
channel or a separate feedback channel.
50. __________ is the time required for a terminal to sense whether or not the channel is idle.
a) Propagation delay
b) Average delay
c) Detection delay
d) Time delay
Answer: c
Explanation: In CSMA protocols, detection delay and propagation delay are two important
parameters. Detection delay is a function of the receiver hardware and is the time required
for a terminal to sense whether or not the channel is idle.