UNIT-V
1. | How many non-overlapping channels are available with 802.11g? | |||||||
Answer: Option A |
2. | What is the maximum distance running the lowest data rate for 802.11g? | |||||||
Answer: Option C |
7. What is the code called which is used to spread the signal across the places?
Answer: Pseudo-noise code
Answer: Pseudo-noise code
8. This is the family of specifications for wireless local area networks (WLANs) developed by a working group of the Institute of Electrical and Electronics Engineers (IEEE).
a. 3G
b. 802.11
c. 802.3
d. 802.5
a. 3G
b. 802.11
c. 802.3
d. 802.5
Answer : b,
9. Which of the following refers to a standard or group of standards that are still being developed as a part of overall IEEE 802.11 WLAN support?
a. 802.11x
b. 802.11i
c. Both of the above.
d. Neither of the above.
a. 802.11x
b. 802.11i
c. Both of the above.
d. Neither of the above.
Answer : c,
10. Which of the following refers to a communications specification that was approved in early 2002 by the Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) for wireless personal area networks (WPANs)?
a. 802.11a
b. 802.15
c. 802.11b
d. None of the above.
a. 802.11a
b. 802.15
c. 802.11b
d. None of the above.
Answer : b
11. Which of the following is a language that allows the text portions of Web pages to be presented on cellular telephones and personal digital assistants (PDAs) via wireless access?
a. HDML
b. Wireless Markup Language
c. Both of the above.
d. Neither of the above.
a. HDML
b. Wireless Markup Language
c. Both of the above.
d. Neither of the above.
Answer : c
12. Developed by International Telecommunication Union (ITU), ______ is a code-division multiple access (CDMA) version of the IMT-2000 standard.
a. CDMA
b. WCDMA
c. CMYK
d. CDMA2000
a. CDMA
b. WCDMA
c. CMYK
d. CDMA2000
Answer : d
13. This is an industry specification that describes how mobile phones, computers, and PDAs can easily interconnect with each other using a short-range wireless connection.
a. Bluetooth
b. EMI
c. D-AMPS
d. IrDA
a. Bluetooth
b. EMI
c. D-AMPS
d. IrDA
Answer : a
13. Which of the following is a faster version of GSM wireless service, designed to deliver data at rates up to 384 Kbps and enable the delivery of multimedia and other broadband applications to mobile phone and computer users?
a. ESMR
b. BREW
c. EDGE
d. ETRN
a. ESMR
b. BREW
c. EDGE
d. ETRN
Answer : c
14. _________ is a security protocol designed to provide a wireless LAN with a level of security and privacy comparable to what is usually expected of a wired LAN.
a. WEP
b. 802.11x
c. RMON
d. LDAP
a. WEP
b. 802.11x
c. RMON
d. LDAP
Answer : a
15. This is a specification for a set of communication protocols to standardize the way that wireless devices can be used for Internet access.
a. WAP
b. WAX
c. VSAT
d. TETRA
a. WAP
b. WAX
c. VSAT
d. TETRA
Answer : a
16. This is the handling of voice, fax, and regular text messages as objects in a single mailbox that a user can access either with a regular e-mail client or by telephone.
a. Short Message Service
b. short messaging
c. UMTS
d. unified messaging
a. Short Message Service
b. short messaging
c. UMTS
d. unified messaging
Answer : d
Answer : On wireless computer networks, ad-hoc mode is a method for wireless devices to communicate with each other peer-to-peer.
18. What is WiFi Infrastructure Mode?
Answer : In wireless networking, infrastructure mode bridges a WLAN with a wired Ethernet LAN and allows Wi-Fi networks to support more clients with greater reach.
Answer : In wireless networking, infrastructure mode bridges a WLAN with a wired Ethernet LAN and allows Wi-Fi networks to support more clients with greater reach.
19. Are 802.11b and 802.11g Compatible?
Answer : 802.11b and 802.11g are both popular standards for Wi-Fi home networking. Can 802.11b and 802.11g gear be mixed on a wireless network, or are they incompatible?
Answer : 802.11b and 802.11g are both popular standards for Wi-Fi home networking. Can 802.11b and 802.11g gear be mixed on a wireless network, or are they incompatible?
20. What Is Wireless Spread Spectrum Communication?
Answer : A set of techniques that have been used in radio communications for decades, spread spectrum is also employed in modern Wi-Fi networking to enhance reliability, increase bandwidth and/or improve security of wireless computer connections.
Answer : A set of techniques that have been used in radio communications for decades, spread spectrum is also employed in modern Wi-Fi networking to enhance reliability, increase bandwidth and/or improve security of wireless computer connections.
UNIT-VI
1. What is Bluetooth?
Answer: Bluetooth is a wireless technology standard used to exchange data over short distances. The data is exchanged from fixed and mobile devices by creating Personal Area Network with security at high level. Bluetooth was originally conceived as a wireless alternate to RS-232 cables. It resolves the problems synchronization by connecting several devices.
2. Bluetooth is called a cable replacement technology. Explain.
Answer: Blue tooth allows Personal Area Networks without the cables. It provides connectivity to many mobiles users at a time for sharing without wires. Blue tooth chip is designed for replacing cables by transmitting the information at a special frequency from sender to receiver.
3. Explain about TCP flow control
Answer: TCP utilizes a flow control protocol from one end to another end for avoiding the sender to send data too quickly for the TCP receiver to receive and process it in a reliable manner. Machines of diverse network can communicate quickly by having the flow control mechanism.
4. Explain the working of trace route.
Answer: Trace route works by increasing the time-to-live value of every successive packets sent in batch. Every three packets that were sent first, have a time-to-live value 1. The next three packets have a TTL value of 2 and so on. The host decrements the TTL value by one and the packet is forwarded to the next host, when a packet passes through a host.
5. What is Piconet?
Answer: Piconet is an ad-hoc network by linking a group of users which uses blue tooth technology protocols for allowing one ‘master’ device to interconnect with up to seven active ‘slave’ devices. Further, up to 255 slave devices could be inactive or packed and the master device can bring into active status at any given point of time.
6. Explain the following terms: ICMP,
Answer: Internet Control Message Protocol: This protocol is used for while checking the connectivity using ping command
7. Explain the following terms ARP,
Answer: Address Resolution Protocol: This protocol is used to know about the properties of TCP/IP. For example, to know other system MAC addresses.
8. Explain the following terms Multicast,
Answer: Multicast: Communication between single sender and a list of select recipients in a network.
9. Explain the following terms Broadcast
Answer: Broadcast: To send messages to all the recipients simultaneously in a network.
10. List out the differences between UDP and TCP
Answer: 1. TCP is connection oriented protocol, where as UDP is connection less protocol.
2. In TCP, information is sent after establishing the connection from client to server, where as data is sent in chunks in UDP.
3. TCP is reliable – unless the connection fails completely, the message will be reached to the destination.
11. What is meant by the term 'IP Spoofing'?
Answer: IP Spoofing: Sending messages by intruder to a computer system with an IP address that indicates the message is sent from a trusted host, for gaining unauthorized access to computer systems. The hacker / intruder first utilize a variety of techniques for finding an IP address of a trusted host. Later he modifies the packet headers, in order to give an illusion that the packets are sent from the host.
12. List the differences between Bluetooth and Wi-Fi IEEE 802.11 in networking
Answer: Bluetooth technology is to replace cables, while Wi-Fi is utilized for providing wireless, high-speed access to the Internet or a local area network.
Bluetooth is specified for fast transmission speeds of 800 kbps, where as Wi-Fi’s transmission speed is 11 mbps.
13. Explain about LMP (Link Management Protocol).
Answer: Multiple data links are combined for the formation of a single traffic engineering link, for the purpose of scalability. The in-band messaging is not restricted by the management of TE links, but can be utilized by using out-of-band techniques.
14. Which technology is used to avoid interference in Bluetooth? Brief the technology used
Answer: Blue tooth uses frequency hopping technology. In this technology, 79 hop frequencies are transmitted and received from 2402 to 2480 mhz. hopping in a pseudo random sequence at a rate of 1600 times in a second. Guassian frequency shift keying modulation is utilized with a maximum data transfer rate of 721 kbps. Bluetooth protocol stack is developed and TCP/IP imported layers are used in this technology.
15. Explain the modulation techniques used in Bluetooth technology.
Answer: Blue tooth uses Frequency Hopping Spread Spectrum technique which is used in spread spectrum signal transmission. During radio transmission, frequencies are switched repeatedly, to help reducing unlawful access to cross paths which causes interruptions. FHSS makes Bluetooth communication more robust and secure. The speed of interferences from other devices will be reduced, though it will not cause the transmission to stop.
16. Explain the modulation techniques used in Bluetooth technology.
Answer: Blue tooth uses Frequency Hopping Spread Spectrum technique which is used in spread spectrum signal transmission. During radio transmission, frequencies are switched repeatedly, to help reducing unlawful access to cross paths which causes interruptions. FHSS makes Bluetooth communication more robust and secure. The speed of interferences from other devices will be reduced, though it will not cause the transmission to stop.
17. Why is Bluetooth 2.0 better than previous versions?
Answer: Bluetooth 2.0 is better than its predecessors because:
1. Bluetooth 2.0 is 3 times faster than 1.2
2. An additional modulation scheme is used
3. It is backwards compatible
4. The number of connections running concurrently are more
5. It is capable of recovering from errors and
6. Power consumption is less
2. An additional modulation scheme is used
3. It is backwards compatible
4. The number of connections running concurrently are more
5. It is capable of recovering from errors and
6. Power consumption is less
18. Explain how data is transferred through Bluetooth.
Answer: The PSI line blue tooth interface converters are used making complex data connections with mobile devices with the utilization of flexible conduits, slip rings and other traditional cable solutions.The universal PSI line interface makes it possible to transmit wireless transmission of the interfaces such as RS-232, RS-422, RS-485 wire and USB.
19. What do you mean by the term Frequency-Hopping Spread Spectrum (FHSS)?
Answer: Flexibility and mobility are the growing reasons to use wireless LAN which uses radio frequencies for transmitting data. Wireless LANs are established for communicating with one another while on the go.
The data transmitting on one frequency for a specific time limit and jumping randomly to another and transmitting again is the process in FHSS. The RF circuits can utilize class C amplification, efficient non-linear with a normal 1 MHz bandwidth.
20. What is LDAP
Answer: Lightweight Directory Access Protocol is one of the directory service protocols. It runs over TCP/IP. LDAP directory services implements a client / server model. Directory data is available on one or more LDAP servers. The server responds with a pointer to another LDAP server.
No comments:
Post a Comment