Академический Документы
Профессиональный Документы
Культура Документы
QUESTION BANK
Subject Code/Subject: EC1451/MOBILE AND WIRELESS COMMUNICATION
Name : K.ANBUARASAN
Dept : ECE
Semester
: VIII
UNIT I
PRINCIPLES OF WIRELESS COMMUNICATION
Digital modulation techniques Linear modulation techniques Spread spectrum modulation
Performance of modulation Multiple access techniques TDMA FDMA CDMA SDMA
Overview of cellular networks Cellular concept Handoff strategies Path loss Fading and
Doppler effect.
PART-A
(1 MARK)
1. An AM signal is represented by x(t) = (20+4sin500t)cos(2x105t)V. The modulation index is
(A) 20
(B) 4
(C) 0.2
(D) 10
2. An AM signal is represented by x(t) = (20+4sin500t)cos(2x105t)V. The total signal power is
(A) 208 W
(B) 204 W
(C) 408 W
(D) 416 W
3. An AM signal is represented by x(t) = (20+4sin500t)cos(2x105t)V. The total sideband power is
(A) 4 W
(B) 8 W
(C) 16 W
(D) 2 W
4. A 2 kW carrier is to be modulated to a 90% level. The total transmitted power would be
(A) 3.62 kW
(B) 2.81 kW
(C) 1.4 kW
(D) None of the above
5. An AM broadcast station operates at its maximum allowed total output of 50 kW with 80% modulation.
The power in the intelligence part is
(A) 12.12 kW
(B) 31.12 kW
(C) 6.42 kW
(D) None of the above
6. A 2 MHz carrier is amplitude modulated by a 500Hz modulating signal to a depth of 70%. If the
unmodulated carrier power is 2 kW, the power of the modulated signal is
(A) 2.23 kW
(B) 2.36 kW
(C) 1.18 kW
(D) 1.26 kW
7. In a DSB-SC system with 100% modulation, the power saving is
(A) 50%
(B) 66%
(C) 75%
(D) 100%
Department of ECE
8. In amplitude modulation, the modulation envelope has a peak value which is double the unmodulated
carrier value. What is the value of the modulation index?
(A) 25%
(B) 50%
(C) 75%
(D) 100%
9. If the modulation index of an AM wave is changed from 0 to 1, the transmitted power
(A) increases by 50%
(B) increases by 75%
(C) increases by 100%
(D) remains unaffected
10. A diode detector has a load of 1k shunted by a 10000 pF capacitor. The diode has a forward
resistanceof 1. The maximum permissible depth of modulation, so as to avoid diagonal clipping, with
modulating signal frequency of 10 kHz will be
(A) 0.847
(B) 0.628
(C) 0.734
(D) None of the above
11. An AM signal is detected using an envelope detector. The carrier frequency and modulating signal
frequency are 1 MHz and 2 kHz respectively. An appropriate value for the time constant of the envelope
detector is.
(A) 500 sec
(B) 20 sec
(C) 0.2 sec
(D) 1 sec
12. For an AM signal, the bandwidth is 10 kHz and the highest frequency component present is 705 kHz.
The carrier frequency used for this AM signal is
(A) 695 kHz
(B) 700 kHz
(C) 705 kHz
(D) 710 kHz
13.
In
a broadcast
transmitter,
the
RF output
is
represented
as
e(t)
=
50[1+0.89cos5000t+0.30sin9000t]cos(6x106t)V. What are the sidebands of the signals in radians?
(A) 5x103 and 9x103
(B) 5.991x106, 5.995x106, 6.005x106 and 6.009x106
(C) 4x103, 1.4x104
(D) 1x106, 1.1x107, 3x106 and 1.5x107
14. An AM modulator has output x(t) = 40cos400t + 4cos360t + 4cos440t. The modulation efficiency is
(A) 0.01
(B) 0.02
(C) 0.03
(D) 0.04
15. An AM modulator has output x(t) = Acos400t + Bcos380t + Bcos420t. The carrier power is 100 W
and the efficiency is 40%. The value of A and B are
(A) 14.14, 8.16
(B) 50, 10
(C) 22.36, 13.46
(D) None of the above
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
C
B
A
B
A
A
B
D
A
A
B
B
B
B
A
PART-B
(2 MARKS)
Department of ECE
The amplitude of the high frequency carried is varied in accordance to the instantaneous amplitude of the
message signal.
30. State the techniques used for SSB generation.
Filter method and balanced modulator method.
31. State the advantages of digital modulation schemes.
Power efficiency and bandwidth efficiency.
32. Define bandwidth efficiency.
It describes the ability of the modulation scheme to accommodate data within a limited bandwidth.
33. Define Power efficiency.
It describes the ability of the modulation scheme to preserve the fidelity of the digital message at low power
levels.
34. State the different types of line coding.
Return to zero, non-return to zero and Manchester.
35. State the types of modulation schemes used in mobile communication.
GMSK, GFSK and DQPSK.
36. Give the equation used to represent a BPSK signal.
SBPSK (t) = m (t)2 Eb cos (2fct + c)
37. What is coherent detector? Tb
If the receiver has prior knowledge of the transmitted signal then the receiver is known as coherent detector.
38. State the advantage of using GMSK rather than MSK.
The bandwidth occupied by GMSK modulated signal is less in comparison to MSK modulated signal.
39. What is CPFSK ?
Continuous phase frequency shift keying. It is another name for MSK.
40. What is QAM ?
Quadrature amplitude modulation.
41. State the difference between MSK and GMSK.
GMSK uses a Gaussian pulse shaping filter prior to MSK.
42. What is a diversity receiver?
Diversity receiver is the diversity scheme applied at the receiver end of the antenna in all effective technique
for reducing interference, where selective combiner is used to combine two-correlated signal.
43. Expand PCS, PLMR, NLOS and DECT.
PCS - Personal Communication Systems.
PLMR Public Land Mobile Radio
NLOS Non Line Of Sight
DECT Digital Equipment Cordless Telephone
44. Mention the three partially separable effects of radio propagation.
The three partially separable effects of radio propagation are,
Multi path fading
Shadowing
Path loss
45. What is known as Quadrature Modulation?
In digital modulations, instead of transmitting one bit at a time, we transmit two or more bits simultaneously.
This is known as M-ary transmission. This type of transmission results reduced channel BW. However sometimes
the use two quadrature carriers for modulation. This process of transmitting 2 quadrature carrier for modulation is
known as quadrature modulation.
46. What are the design characteristics of digital modulation scheme?
Maximum data rate,
Department of ECE
Eb
1
erfc
2
No
1
Eb
Pe exp
2
No
53.In minimum shift keying what is the relation between the signal frequencies and bit rate?
The bit rate is given by
The error probability of DPSK is given by
Eb
1
erfc
2
No
Where
Pe
Department of ECE
Eb
>>>>> Transmitted signal energy per bit;
No
>>>>> Noise density
54. What is maximum likelihood decoder?
Set f x x / mk is always non-negative and since the logarithmic function is a monotonically increasing
function of its argument we may restate the decision rule in terms of metric as follows
Set m m i, if
ln f x X / mk is maximum for k = i
Where ln denotes the a natural log. This decision rate is referred to as maximum likelihood rule and device
for its implementation is referred to as maximum likelihood decoder.
55.What is DPSK?
Differential phase shift keying is the non-coherent version of PSK. It is differentially coherent modulation
method. It does not need a synchronous carrier at the demodulator. The input sequence of binary bits is modified
such that the next bit depends upon the previous bit. Therefore in the receiver bits are used ot detect the present
bit.
56.What are the advantages of DPSK?
DPSK does not need carrier at its receiver. This means that the complicated circuitry for generation of local
carrier is avoided.
The bandwidth requirement of DPSK is reduced compared to that of BPSK
57.What is capture effect?
The capture-effect is a direct result of the rapid nonlinear improvement in received quality for an increase
in the received power. If two signals in the same frequency band are available at an FM receiver, the one appearing
at the higher received signal level is accepted and demodulated, while the weaker one is rejected. This inherent
ability to pick-up the strongest signal and reject the rest makes FM systems very resistant to co-channel interference
and provides excellent subjective received quality. This effect is called as capture-effect.
PART-C
(16 MARKS)
58. Describe in detail about the Analog Amplitude Modulation techniques used in mobile radio.
59. Describe in detail about the Angle Modulation techniques used in mobile radio.
60. Describe in detail about the demodulation techniques for FM waves used in mobile radio.
61. Describe in detail about the Digital modulation schemes BPSK. [MAY-2011]
62. Describe in detail about the Digital modulation schemes DPSK and QPSK.
63. Describe in detail about the Space diversity techniques.
64. Explain the concept of TDMA scheme. [MAY-2011]
65. Explain hand off process in cellular networks. [MAY-2011]
Department of ECE
UNIT II
WIRELESS PROTOCOLS
(1 MARK)
PART-A
(1 MARK)
66. To send a packet data using datagram, when a connection will be established
a) before data transmission
b) connection is not established before data transmission
c) no connection required
d) none of the above
67.connectivity is a concept related to
a) transmitting information,either by computer or by a phone
b) the interconnection within a computer
c)using computer networks to link people and resources
d)being in an active session with your computer
68.One of the most dramatic changes in connectivity and communications in the past five years or so has
been ____
a) mobile or wireless telephones
b) public and private discussion
c) satellite uplinks
d) running programs on remote computers
69.The four basic elements of any communication system include
a)peer-to-peer, videoconferencing, online photo-conferencing, net optical
b)sending and receiving devices, communication channel, connection device, and data transmission specifications
c)telephone lines, coaxial cables, fiber-optics cables, and communication channel
d)software, hardware, communication channel, network
70.These communication devices originate as well as accept messages in the form of data, information,
and/or instructions.
a) i-drives
b)sending and receiving devices
c) key chain drives
d) optical drives
71.The transmission medium that carries the message is referred to as the
a)send and receive device
b)communication channel
c)protocol
d)gateways
72.Data is transmitted using light through a ____ cable.
a)twisted pair
b)fiber-optic
c)coaxial
d)microwave
73.Which physical connection is the fastest?
a) twisted pair
b) coaxial cable
c) fiber-optics
d) microwaves
74.Most Web-enabled devices follow a standard known as
Department of ECE
a)FireWire
b)Bluetooth
c)TCP/IP
d)Wi-FI
75.This wireless standard is widely used to connect computers to each other and to the Internet.
a) 802.11
b) RJ45
c)Blueband
d) Broadband
76.Bluetooth is a type of radio wave information transmission system that is good for about
a)30 feet
b)30 yards
c) 30 miles
d)300 miles
77.A term relating to sending data to a satellite is
a)uplink
b) downlink
c) modulate
d)demodulate
78.A credit card-sized expansion board that is inserted into portable computers that connects the PC to the
telephone wall jack is called what?
a)Internal modem
b)External modem
c)PC Card modem
d)Wireless modem
79.Standard telephone lines and conventional modems provide what is called
a)Bluetooth service b)dial-up service
c)wireless service
d)WiFI service
80.Special high-speed lines used by large corporations to support digital communications are known as
a)satellite/air connection service lines
b)cable modems
c)digital subscriber lines
d)T1, T2, T3 and T4 lines
81.The rules for exchanging data between computers are called
a)interconnections
b)synchronous packages
c)protocols
d)data transmission synchronization
82.Each computer on the Internet has a unique numeric address called a(n)
a)domain address
b)protocol address
c)IP address
d)Web address
83.____ is the process of breaking down information sent or transmitted across the Internet into small
parts called packets.
a)protocol
b)bandwidth
c)reformatting
d)identification
84.Two or more computers connected so that they can communicate with each other and share information
is called a
a)satellite
b)protocol
c)broadcast
d)network
ANSWER:
66 67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
PART-B
(2 MARKS)
Department of ECE
Aloha, also called the Aloha method, refers to a simple communications scheme in which each source
(transmitter) in a network sends data when ever there is a frame to send. If the frame successfully reaches the
destination (receiver), the next frame is sent. If the frame fails to be received at the destination, it is sent again. This
protocol was originally developed at the University of Hawaii for use with satellite communication systems in the
Pacific.
88. What is IMT 2000?
IMT 2000, also known as International Mobile Telecommunications 2000, is the ITU globally coordinated
definition of 3G covering key issues such as frequency spectrum use and technical standards. More information is
available in this presentation
89. What are different types of 3G Networks specified by IMT 2000?
ITU Recommendation ITU-R M.1457 specifies five types of 3G radio interfaces:
1.IMT-2000 CDMA Direct Spread, also known as UTRA FDD including WCDMA in Japan, ARIB / DoCoMo
recommendation. UMTS is developed by 3GPP.
2.IMT-2000 CDMA Multi-carrier, also known as Cdma2000 (3X) developed by 3GPP2. 3.IMT-2000 CDMA2000
includes 1X components, like cdma2000 1X EV-DO.
4.IMT-2000 CDMA TDD, also known as UTRA TDD and TD-SCDMA. TD-SCDMA is developed in China and
supported by TD-SCDMA Forum.
5.IMT-2000 TDMA Single Carrier, also known as UWC-136 (Edge) supported by UWCC.
6.IMT-2000 DECT supported by DECT Forum.
90. Define Home network
The home network of a mobile device is the network within which the device receives its identifying IP
address (home address).
91. Define Home address
The home address of a mobile device is the IP address assigned to the device within its home network.
92. What is Foreign network?
A foreign network is the network in which a mobile node is operating when away from its home network.
93. Define Care-of address
The care-of address of a mobile device is the network-native IP address of the device when operating in a
foreign network.
94. Define Home agent
A home agent is a router on a mobile nodes home network which tunnels datagrams for delivery to the
mobile node when it is away from home. It maintains current location (IP address) information for the mobile node.
It is used with one or more foreign agents.
95. Define foreign agent
A foreign agent is a router that stores information about mobile nodes visiting its network. Foreign agents
also advertise care-of-addresses which are used by Mobile IP.
PART-C
(16 MARKS)
Department of ECE
UNIT III
TYPES OF WIRELESS NETWORKS
Mobile networks Ad-hoc networks Ad-hoc routing Sensor networks Peer-Peer networks
Mobile routing protocols DSR AODV Reactive routing Location aided routing
Mobility models Entity based Group mobility Random way Point mobility model.
PART-A
(1 MARK)
104.The performance of a scatternet degrades as the number of piconets is increased. Degradation is
caused by _________ probability that two, or more, devices may simultaneously attempt transmission
using ____________.
a)an increased; the same carrier frequency.
b)a decreased; the same carrier frequency.
c)an increased; a different carrier frequency.
d)a decreased; a different carrier frequency.
105.State the error control scheme used in Bluetooth.
a)Go-back-N.
b)Selective repeat.
c)Idle ARQ.
106.A wireless LAN found in a train or bus station is an example of a(n):
a)public wireless LAN.
b)infrastructure wireless LAN.
c)ad-hoc wireless LAN.
107.Which of the following statements is true of a wireless LAN?
a)Communication between devices may only occur via an access point.
b)Communication between devices may only occur in ad-hoc mode.
c)Communication between devices may occur via an access point, or in ad-hoc mode.
108.The operational modes of DCF used in IEEE 802.11 networks are:
a)CSMA/CA and RTS/CTS.
b)Polling and CSMA/CA.
c)CSMA/CD and RTS/CTS.
d)Polling and RTS/CTS.
109.GSM includes HLR and VLR databases. Their uses may be described as:
a)a VLR copies all relevant information for a user from the HLR every time a user moves from one cell to
another.
b)the contents of HLR's and VLR's is always the same.
c)every time a user moves into a location area of a different MSC, all relevant user information is copied from the
VLR to the HLR associated with the new MSC.
d)every time a user moves into the location area of a different MSC, all relevant user information is copied from
the HLR to the VLR associated with the new MSC.
110.Telephone systems may be classified as:
a)simplex and symmetrical.
b)simplex and asymmetrical.
c)duplex and asymmetrical.
d)duplex and symmetrical.
111.A network that provides a constant bandwidth for the complete duration of a message transfer is a:
Department of ECE
105
c
106
a
107
c
108
a
109
D
110
D
111
c
PART-B
112
c
113
c
114
A
115
a
116
c
117
b
118
a
(2 MARKS)
Department of ECE
(16 MARKS)
UNIT IV
ISSUES AND CHALLENGES
Department of ECE
143.A block of data consisting of 2048 bits is transmitted between two computers interconnected by 450 m
of twisted-pair wire. If the transmission rate is 34 kbps determine a, the ratio of propagation delay to
transmission delay.
a)376 x 10-6
b)3.76 x 10-6
c)3.76 x 10-3
d)37.6 x 10-6
144.Asynchronous transmission may be defined as:
a)communication where the receiver clock must be in approximate synchronism with that of the transmitter.
b)communication where the receiver clock must be in exact synchronism with that of the transmitter.
c)communication where receiver will operate satisfactorily, even if its clock frequency is appreciably different to
that of the transmitter.
145.Synchronous transmission may be defined as:
a)communication where the receiver will operate satisfactorily, even if its clock frequency is appreciably different
to that of the transmitter.
b)communication where the receiver clock is arranged to be in exact synchronism with that of the receiver.
c)communication where the receiver clock must be in approximate synchronism with that of the transmitter.
146.Manchester encoding is principally designed to:
a)ensure that a transition occurs in the centre of each bit period.
b)increase the bandwidth of a signal transmitted on the medium.
c)ensure that the line remains unbalanced.
d)have more than one symbol per bit period.
147.Which of the following correctly describes slot time?
a)The worst-case signal propagation delay time plus a safety margin.
b)Twice the worst-case signal propagation delay time.
c)Twice the worst-case signal propagation delay time plus a safety margin.
d)The collision window.
148.When a station detects that a collision has occurred it:
a)waits a random interval in time and then re-examines the medium to see if it is free.
b)waits a random interval in time and then retransmits.
c)waits until the medium becomes free and then retransmits.
149.An L DATA. request frame in the IEEE802.3 standard is:
a)a connectionless, acknowledgement.
b)a connectionless, unnumbered frame.
c)a connectionless, unnumbered acknowledgement.
150.Subrate multiplexing may be defined as:
a)a form of multiplexing that is adequate but incurs some loss of performance.
b)dividing a data channel into two, or more, lower rate data channels.
c)multiplexing a number of channels in such a way that the aggregate bandwith is less than the sum of the
bandwidths of each channel being multiplexed.
151.In relation to DES, chaining is used because:
a)chaining, in addition to secrecy, provides integrity of data.
b)in electronic code book mode of working one, or more, blocks of data may be tampered with in transmission
and the receiver be unaware of the fact.
c)encryption is achieved more rapidly.
d)a greater degree of secrecy is provided.
152.Select the answer/s that correctly apply to an RSA digital signature.
a)A digital signature proves to a recipient that the sender is authentic.
b)A digital signature facilitates non-repudiation.
c)A digital signature provides a message digest.
Department of ECE
150
b
151
a
152
b
PART-B
(2 MARKS)
153. What are main subsystems of GSM architecture?
i) Base station subsystem (BSS)
ii) Network &switching subsystem (NSS)
iii) Operation support subsystem (OSS)
154. What are frequencies used in forward and reverse link frequency in GSM?
(890-915) MHz- reverse link frequency, (935-960) MHz-forward link frequency
155. What is CDMA digital cellar standard (is 95)?
IS-95- interim standard
IS 95 allows each user with in the a cell to use the same radio channel and user in adjacent cell also use the same
radio channel since this is a direct sequence spread spectrum CDMA system.
156. What are frequencies used in forward and reverse link frequency in IS-95?
(824-849) MHz- reverse link frequency
(869-894) MHz-forward link frequency
157. State certain access technologies used in mobile satellite communication systems.
FDMA, TDMA and CDMA.
158. State the different types of handoffs.
Soft handoff, hard handoff, forced handoff, delayed handoff and mobile associated handoff.
159. What is intersystem handoff ?
During a course of a call, if a mobile moves from one cellular system to a different cellular system
controlled by a different MSC it is referred as intersystem handoff.
160. State the expression that relates co channel reuse ratio (Q) to radius (R) of a cell
Q = D/R
D Distance between center of co channel cells
161. State the expression used to locate co channel cells.
N = i2 + ij + j2
162. Define the term dwell time.
The time over which a call may be maintained within a cell without handoff.
163. State the advantage of umbrella cell approach.
It provides large area coverage to high speed users while providing small area
coverage to users traveling at low speeds.
164. Define co channel cells.
The cells that operate with the same set of frequencies are referred as co channel cells.
165. Define the term Erlong.
One Erlong represents the amount of traffic intensity carried by a channel that is completely occupied.
PART-C
(16 MARKS)
170.Explain the concepts of CDMA. What are its merits and demerits? Explain the working principle of
RAKE receiver.
171.Explain the TDMA frame structure and derive the efficiency of a TDMA system
172.Explain detail about DECT?
173.Explain detail about IS-95
UNIT V
SIMULATION
Study of various network simulators (GloMoSim NS2 Opnet) Designing and evaluating the
performance of various transport and routing protocols of mobile and wireless networks using
network simulator (any one).
PART-A
(1 MARK)
174.Select the answer/s that correctly apply to PGP encryption.
a)RSA is used to encrypt the message to be transferred.
b)RSA is used to exchange a private key between sender and recipient.
c)Private key encryption is used to encrypt the message to be transferred.
d)RSA is used to encrypt a message digest.
175.Two security threats that E-commerce must guard against are that an eavesdropper may _____
Internet communication to obtain_____ information which may then be used by a third party to make
_____ purchases. Secondly, a bogus site may be used to obtain _____ without providing any goods or
services.
a)interrupt; some; fraudulent; money
b)intercept; confidential; multiple; details
c)intercept; confidential; fraudulent; money
d)intercept; some; free; money
176.Select which reasons Secure Electronic Transactions (SET) is preferred to SSL.
a)The vendor can verify that the purchaser has a legitimate card.
b)Guarantees delivery of goods or services.
c)The person making the payment is the legitimate cardholder.
d)The purchaser may verify that the vendor is authorized to engage in payment card transactions.
177.Network address translation is a technique whereby multiple hosts may be active, each assigned a ____
address. Every datagram passed to the Internet, via a NAT router, has its source address changed to a
single IP address assigned to the organization, irrespective of which host is active. For NAT to work, the
router holds a table which maps ____ to ____.
a)an IP; public addresses; private address and associated TCP port address
b)an IP; addresses; an Internet address
c)a unique private IP; private addresses; the Internet address and associated TCP port address
178.Loading the contents of routing tables into a router prior to it being put into service is an example of
which routing protocol?
a)Flooding.
b)Link-state shortest-path-first.
C)Static.
d)Distance vector.
179.Tunneling may be described as whereby a _______ receives a datagram, or packet, on an incoming
port and forwards it to an outgoing port _______.
Department of ECE
175
C
188
d
176
a
189
a
177
c
190
c
178
c
191
d
(2 MARKS)
193.What is CDPD?
CDPD is a Cellular packet digital Data System that uses packet switched data .The bit rate in the RF channel
for CDPD is !9.2kbps
194.Write some features of TDMA?
*In TDMA , no. of time slots depends upon modulation technique ,available bandwidth
*Data transmission occurs in bursts
*It uses different time slots for transmission and reception, then duplexers are not
required
195.Write some features of CDMA?
*In CDMA system, many users share the same frequency either TDD or FDD may be Used
*Channel data rate is high
*Multipath fading may be substantially reduced
*CDMA uses co channel cells, it can use macroscopic spatial diversity to provide soft hand off
196.Write the features of DECT?
1.DECT provides a cordless communication framework for high traffic intensity, short range telecommunication
and covers a broad range of applications and environment
Department of ECE
PART-C
(16MARKS)
Department of ECE