Category Archives: CIS 513 Complete Class Solution

Need help with your exams and quizzes?

Visit www.hwgala.com

search through our website for Exams and Quizzes Solutions, Assignments and Discussion Questions and ACE your class.If you cannot find what you are looking for, email us at
writersorg@gmail.com

CIS 513 Final Exam

CIS 513 Week 11 Final Exam – Strayer

Click On The Link Below To Purchase:

http://www.hwmojo.com/products/cis-513-final-exam

 

Chapters 5 Through 8

Chapter 5 – Wireless Personal Area Networks

TRUE/FALSE

1. WPAN technologies are designed to connect devices that are typically up to 10 meters apart.

2. One of the advantages of WPAN technologies is their conservative use of battery power.

3. The first step in the Bluetooth pairing process is the paging procedure.

4. A reduced-function device can only connect to one full-function device on the network.

5. Bluetooth uses a challenge-response strategy for device authentication.

MULTIPLE CHOICE

1. Which of the following is NOT a likely application for WPAN technologies?
a. home control systems c. industrial control systems
b. video streaming d. security systems

2. Which of the following is true about WPAN standards?
a. IEEE developed standards for protocols above layer 2 c. IEEE 802.15.1 is the Bluetooth standard
b. industry alliances developed specifications for layers 1 and 2 d. 802.16n is the ZigBee standard

3. Which of the following is true about the OSI model and IEEE 802?
a. the PMD is part of the Data Link layer c. the LLC is part of the Physical layer
b. the PLCP formats data received from the MAC d. the MAC layer is responsible for establishing connectivity to the local network

4. Which radio frequency band does Bluetooth use?
a. 2.4 GHz ISM c. 2.0 GHz ISM
b. 5.0 GHz ISM d. 4.2 GHz ISM

5. Which of the following is true about the Bluetooth protocol stack?
a. the L2CAP sits between Baseband and RF c. Link Manager communicates directly with the Physical Radio
b. the Baseband layer sits atop the RF layer d. The RF layer communicates between the Link Manager and L2CAP

6. What feature available in some Bluetooth devices increases data rates to 2.1 or 3 Mbps?
a. Link Manager c. L2CAP
b. radio module d. EDR

7. Which Bluetooth power class allows transmission ranges up to 330 feet?
a. Power Class 1 c. Power Class 3
b. Power Class 2 d. Power Class 4

8. Bluetooth 1.x uses a variation of which modulation technique?
a. PSK c. FSK
b. ASK d. GSK

9. What feature of Bluetooth version 3.0 uses a separate radio module that transmits using the same methods as IEEE 802.11?
a. BLE c. AMP
b. ULP d. NFC

10. Which transmission technique is used by Bluetooth devices?
a. Narrowband c. DHSS
b. FHSS d. UWB

11. Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a minimum of interference?
a. adaptive frequency hopping c. alternate MAC/PHY
b. frequency hopping spread spectrum d. Bluetooth low energy

12. What is created when a Bluetooth network has one master and at least one slave using the same channel?
a. scatternet c. piconet
b. wi-fi net d. bluenet

13. How is the master device determined in a Bluetooth network?
a. the device with the lowest address number c. the first device to send out an inquiry message to discover other devices
b. the device with the highest priority hop sequence on the piconet d. the device that carries out a paging procedure and establishes a connection

14. Which of the following is NOT a field in a Bluetooth frame?
a. Access code c. Header
b. Frame check sequence d. Payload

15. Which of the following is NOT a Bluetooth error correction scheme?
a. 1/3 rate FEC c. ARQ
b. 2/3 rate FEC d. CRC

16. In which Bluetooth power mode is only the slave device’s internal timer running?
a. active mode c. hold mode
b. sniff mode d. park mode

17. Which of the following is true about the ZigBee standard?
a. designed to support mesh networking c. used for larger data transfers than Bluetooth
b. replaced an existing global, open standard d. operates in the 5.0 and 6.5 GHz ISM bands

18. Which layer in a ZigBee device is responsible for detecting the presence of an RF signal in the currently selected channel?
a. LLC c. MAC
b. PHY d. Upper

19. Which task is the MAC layer responsible for in an 802.15.4 device?
a. turning the radio transceiver on and off c. association and disassociation
b. analyzing link quality d. selecting a frequency channel for operation

20. Which type of ZigBee device controls the network in a star topology?
a. all end-node devices c. full-function device
b. reduced function device d. PAN coordinator

COMPLETION

1. In a ZigBee tree topology, if a child loses it connection with its FFD, it becomes a(n) _____________.

2. ________________ is an 802.15.4-based technology that implements IPv6 on WPANs and supports mesh networking.

3. A ______________ authority is a private company that verifies the authenticity of each user in order to discourage fraud.

4. In Bluetooth Encryption Mode ______, all traffic is encrypted.

5. 802.15.4 provides for _______________ integrity, a technique that uses a message integrity code.

MATCHING

a. 8-DPSK f. inquiry procedure
b. ACL link g. MIC
c. ARQ h. modulation index
d. binding i. sequential freshness
e. guaranteed time slots j. superframe

1. a reserved period for critical devices to transmit priority data

2. a simple method of phase shift keying that uses eight degrees of phase to encode tribits

3. the process of establishing a relationship between endpoints in a ZigBee network

4. a security service available in 802.15.4 and used by the receiving device

5. a process that enables a device to discover which devices are in range

6. a packet-switched link that is used for data transmissions

7. the amount that the frequency varies

8. an error-correction scheme that continuously retransmits until an acknowledgment is received or a timeout value is exceeded

9. a mechanism for managing transmissions in a piconet

10. a code composed of a subset of the data, the length of the data, and the symmetric key

SHORT ANSWER

1. What are the three types of addresses used in a Bluetooth piconet? Describe each.

2. Describe the two types of physical links between Bluetooth devices.

3. What are the two types of network access used in IEEE 802.15.3 networks? Describe them.

4. List three of the seven tasks the 802.15.4 MAC layer is responsible for.

5. What are the four levels of addresses for identifying devices within a ZigBee PAN?

6. What is a cluster tree topology and how do they compare to mesh networks?

7. How is power management implemented in a ZigBee network?

8. Describe the WirelessHART technology.

9. List and describe the three levels of Bluetooth security.

10. What is the process that ZigBee WPANs use for authentication and encryption? Describe how it works.

Chapter 6 – High-Rate Wireless Personal Area Networks

TRUE/FALSE

1. IEEE 802.15 covers all the WPAN working groups.

2. The WHDI consortium developed the WHDI specification primarily for the delivery of data produced from online database queries.

3. The piconet coordinator in a WirelessHD network should be a battery operated device for mobility.

4. The DSPS power saving mode allows devices to sleep for long periods of time until they choose to wake up and listen to a beacon.

5. UWB is capable of handling multiple data streams, including HD television.

MULTIPLE CHOICE

1. Which IEEE standard enables multimedia connectivity between mobile and fixed consumer devices within the home?
a. 802.15.3c c. 802.15.1
b. 802.15.5 d. 802.15.4

2. In which frequency range does WHDI operate?
a. 2.4 GHz c. 5 GHz
b. 800 MHz d. 400 KHz

3. Which of the following is true about WiGig?
a. it is compatible with 802.11ac c. makes use of technology designed by AMIMON
b. it requires layer 3 and 4 protocols for audiovisual support d. it has adopted the 802.15.3c standard for multimedia distribution

4. What does WiGig use to maintain reliable connections at very high frequencies?
a. single-carrier modulation c. OFDM
b. beamforming d. protocol adaptation layers

5. What technique does WirelessHD employ to support data rates over 25 Gbps?
a. LRP c. HDMI
b. spatial multiplexing d. beamforming

6. Which of the following is true about a WVAN piconet?
a. the piconet relies on an access point c. large non-mobile devices like TVs are not part of a piconet
b. the PNC is typically a mobile device such as a tablet computer d. the PNC is the first sink device in the area

7. Which of the following is described as a piconet that has its own PNC but depends on the original piconet’s PNC to allocate a private block of time when its devices are allowed to transmit?
a. child piconet c. neighbor piconet
b. parent piconet d. subordinate piconet

8. Which of the following is NOT an HR WPAN feature provided by the 802.15.3 MAC layer?
a. uses a one-octet device ID c. data transport includes QoS
b. PNC can be queried about other devices d. infrastructure mode networking is supported

9. Which part of an 802.15.3 superframe is used for association and command communication?
a. contention access period c. channel time allocation period
b. beacon d. management channel time allocation

10. What type of transmission method does an 802.15.3 piconet use during the CTAP?
a. SDMA c. FDMA
b. TDMA d. CDMA

11. Which field of the 802.15.3 MAC frame format is used to reassemble a file in the correct sequence?
a. Frame control c. Fragmentation control
b. Piconet ID d. Stream index

12. Which 802.15.3 power-saving methods allows devices to sleep for the duration of several superframes and allows them to wake up in the middle of a superframe to transmit or receive data?
a. PSPS c. PSPS
b. APS d. APCI

13. Which radio band does the 802.15.3c standard use?
a. 5.0 GHz c. 2.4 GHz
b. 60 GHz d. p00 MHz

14. How many channels and what is the width of each 802.15.3c channel?
a. 4, 2 GHz c. 11, 25 MHz
b. 6, 200 MHz d. 14, 50 MHz

15. Which of the following is NOT a 802.15.3c PHY layer enhancement?
a. passive scanning c. channel energy detection
b. parity bit error detection d. transmit power control

16. The RF modulation techniques used for 802.15.3c are variations of which of the following?
a. QAM and PSK c. NRZ-L and NRZ-I
b. FSK and ASK d. BPSK and QPSK

17. In the WirelessHD specification 1.1, Which of the following is NOT a function of the higher protocol layers?
a. video format selection c. device discovery
b. clock synchronization d. video and audio encoding and decoding

18. What application has UWB been used for since the 1960’s?
a. video streaming c. cellular phone towers
b. ground-penetrating radar d. automobile speed detectors

19. What term is used for the technique in which the amplitude, polarity, or position of an analog pulse represents either a 1 or a 0?
a. biphase modulation c. direct-sequence UWB
b. mesh networking d. impulse modulation

20. What type of attack on a Bluetooth device can access contact lists without the user’s knowledge?
a. bluejacking c. bluesnarfing
b. bluespoofing d. blueDoS

COMPLETION

1. The IEEE 802.15.3c standard enables ________________ connectivity between mobile and fixed consumer devices within the home.

2. The WHDI specification is designed to mirror the screens of multiple devices to the TV screen with the use of ____________.

3. _____________________ uses multiple radios and antennas to steer a signal in the direction of the receiver.

4. ZigBee uses a(n) _______________ encryption key for network-wide communications.

5. Security for IEEE 802.15.3 HR WPANs is based on ________________, a symmetric key encryption mechanism.

MATCHING

a. biphase modulation f. isochronous
b. channel time allocations g. MCTA
c. contention access period h. PNC
d. D-WVAN i. spatial multiplexing
e. H-WVAN j. superframe

1. periods of time allocated by the PNC to a specific device for prioritizing communications

2. the home or parent WVAN

3. time periods used for communication between the devices and the PNC

4. a mechanism used to communicate commands or any asynchronous data that may be present in a superframe

5. a technique that uses multiple radios and multiple antennas to transmit and receive different parts of the same PHY frame

6. a time-dependent transmission that must occur every frame or every so many
frames to maintain the quality of the connection

7. a mechanism for managing transmissions in a piconet

8. a device that provides all the basic communications timing in an 802.15.3 piconet

9. uses a half-cycle positive analog pulse to represent a 1 and a half-cycle negative analog pulse to represent a 0

10. a secondary wireless video area network that operates in a different frequency channel

SHORT ANSWER

1. Provide a summary of the purpose and application for IEEE 802.15.3c.

2. List four potential HR WPAN applications.

3. What was the primary purpose the WHDI consortium developed the WHDI specification?

4. What do the PALs do for WiGig?

5. What are the three sections the WirelessHD specification divides the PHY layer into?

6. Describe child and neighbor piconets.

7. Describe the three parts of an 802.15.3 superframe.

8. What information is contained in the Frame control field of an 802.15.3 frame?

9. List and describe the two modes of security for IEEE 802.15.3 HR WPANs.

10. Briefly discuss the potential of spectrum conflict with WPANs.

Chapter 7 – Low-Speed Wireless Local Area Networks

TRUE/FALSE

1. A wireless residential gateway provide better security than connecting a computer directly to the Internet.

2. The range of an AP base station is approximately 375 feet in an environment with no obstructions and little interference.

3. When transmitting above 2 Mbps using DSSS in an 802.11b network, a Barker code is used.

4. The PHY layer of the 802.11b standard provides functionality for a client to join a WLAN and stay connected.

5. A SIFS occurs immediately after the transmission of frames and no device is allowed to transmit during the SIFS.

MULTIPLE CHOICE

1. Which of the following is NOT true about wireless NICs?
a. they change the computer’s internal data from serial to parallel before transmitting c. they have an antenna instead of a cable port
b. you can connect an external wireless NIC to a USB port d. notebook computers often use Mini PCI cards for wireless NICs

2. Which component found in an access point is NOT found in a wireless NIC?
a. radio transmitter c. radio receiver
b. RJ-45 interface d. antenna

3. Aside from acting as the base station for the wireless network, what other function does an AP perform?
a. it routes packets c. proxy server
b. acts as a bridge d. it performs as a firewall

4. Where does an AP that it using PoE get its DC power from?
a. an AC outlet c. UTP cables
b. a built-in AC/DC converter d. high-frequency radio waves

5. If three friends each have a laptop computer and they want to exchange files wirelessly but nobody has an AP, what should they do?
a. use Ad hoc mode c. use the Basic Service Set
b. use infrastructure mode d. use the Extended Service Set

6. What is the term used for when a client finds a different AP that can provide a better-quality signal and then associates with the new AP?
a. reassociation c. transfer
b. reconnect d. handoff

7. Which of the following is NOT a field in the 802.11b PLCP frame?
a. Start frame delimiter c. Signal data rate
b. Source address d. Length

8. Which field of the PLCP frame indicates how long in microseconds the data portion of the frame is?
a. Start frame delimiter c. Service
b. Signal data rate d. Length

9. What is the primary job of the PMD sublayer?
a. translate binary 1s and 0s into radio signals c. reformat the data received from the MAC layer
b. evaluate the Header error check field d. implement a channel access method

10. What is the maximum throughput a device can achieve operating on an 802.11b network?
a. about 11 Mbps c. about 54 Mbps
b. about 5.5 Mbps d. about 27 Mbps

11. What is the period of time devices must wait after the medium is clear before attempting to transmit?
a. collision timeframe c. backoff interval
b. signal data rate d. synchronization period

12. What is the RTS/CTS protocol designed to reduce or prevent?
a. negative acknowledgements c. collisions
b. CRC errors d. handshakes

13. With which channel access method does the AP ask each computer if it wants to transmit?
a. point coordinated function c. CSMA/CD
b. CSMA/CA d. virtual carrier sensing

14. In active scanning, what does the client do initially to start the association process?
a. poll the access point c. send a beacon with the requested SSID
b. send a probe frame d. transmit an associate request frame

15. What is the last frame sent to successfully conclude a client’s attempt to associate using active scanning?
a. scan reply c. probe response
b. synchronize acknowledgement d. associate response

16. Which of the following is true about client’s associating with an AP?
a. an AP can reject the request based on the client MAC address c. a client can reassociate with another AP in a BSS
b. a client can be associated to multiple APs simultaneously for fault tolerance d. if a client is not preconfigured for a specific AP, it will not attempt to associate

17. Which of the following is NOT true about WLAN power management?
a. power management is transparent to applications c. the AP uses timestamps to maintain synchronization
b. 802.11b devices use power management in ad hoc mode d. the AP keeps a record of which client’s are sleeping

18. What is the list of devices called that an AP sends in a beacon that indicates which clients have buffered frames waiting?
a. sleep mode identifier c. traffic indication map
b. buffered frames allocation d. packet delivery list

19. Which of the following is a function performed by MAC management frames?
a. request-to-send c. reassociation request
b. transmit data to the client d. acknowledgement

20. What is the time period during which all devices must wait between transmissions of data frames?
a. Short Interframe Space c. Idle Requirement Period
b. DCF Interframe Space d. Transmission Control Period

COMPLETION

1. In the place of a port for a cable connection, a wireless NIC has a(n) ______________.

2. An AP acts as a(n) ____________ between the wired and wireless networks.

3. ____________________ mode consists of at least one wireless client connected to a single AP.

4. Once the _____________ has formatted the frame, it passes the frame to the PMD sublayer.

5. When a client is finishing transmitting, it begins listening for a(n) ________________ from the receiving device.

MATCHING

a. ACK f. control frames
b. active scanning g. DCF
c. associate request frame h. fragmentation
d. BSS i. management frames
e. channel access methods j. passive scanning

1. a WLAN mode that consists of at least one wireless client and one AP

2. a frame sent by a client to an AP that contains the client’s capabilities and supported rates

3. MAC frames that assist in delivering the frames that contain data

4. the process of listening to each available channel for a set period of time

5. the division of data to be transmitted from one large frame into several smaller frames

6. a procedure used to reduce collisions by requiring the receiving station to send an explicit packet back to the sending station

7. the default channel access method in IEEE 802.11 WLANs

8. MAC frames that are used, for example, to set up the initial communications between a client and the AP

9. the process of sending frames to gather information

10. the different ways of sharing resources in a network environment

SHORT ANSWER

1. What are the four steps involved in wireless NIC transmission?

2. Describe the two basic functions of an AP.

3. What is infrastructure mode? Include a discussion of BSS and ESS in your answer.

4. What is a drawback of an ESS WLAN with respect to roaming users? What is a remedy to this drawback?

5. Describe the Physical layer of the 802.11b standard.

6. List the three parts of the PLCP frame.

7. How does CSMA/CA in DCF handle media contention?

8. How does RTS/CTS work?

9. Describe the six basic rules of communication in an 802.11 network.

10. Describe the six steps that occur if two devices have frames to transmit.

Chapter 8 – High-Speed WLANs and WLAN Security

TRUE/FALSE

1. The 802.11a standard maintains the same MAC layer functions as 802.11b WLANs.

2. Increasing data transmission speed through more complex modulation schemes makes multipath distortion worse.

3. The 4-bit Rate field in an 802.11a PLCP frame specifies the speed at which the Data field will be transmitted.

4. Wireless controllers incorporate most AP functions including the radio.

5. VPNs encrypt a connection for security and use very few processing resources.

MULTIPLE CHOICE

1. Which of the following 802.11 standards uses U-NII bands and does not use ISM bands?
a. 802.11b c. 802.11g
b. 802.11a d. 802.11n

2. Which of the U-NII bands is approved for outdoor use?
a. U-NII-1 c. U-NII-2 Extended
b. U-NII-2 d. U-NII-3

3. What is the multiplexing technique used by 802.11a to help solve the multipath distortion problem?
a. QPSK c. FEC
b. OFDM d. PBCC

4. How many bits per symbol can be transmitted using 16-QAM?
a. 16 c. 4
b. 2 d. 8

5. Which wireless data rate uses 64-level quadrature amplitude modulation, transmitting over 48 subcarriers?
a. 11 Mbps c. 24 Mbps
b. 2 Mbps d. 54 Mbps

6. Which layer defines the characteristics of the wireless medium?
a. PLCP c. LLC
b. PMD d. MAC

7. Which field in an 802.11a PLCP frame are used to initialize part of the transmitter and receiver circuits?
a. Tail c. Service
b. Pad d. Parity

8. What is the disadvantage of an 802.11a WLAN compared to an 802.11b WLAN?
a. shorter range c. more interference sources
b. higher error rate d. lower bandwidth

9. How many non-overlapping channels are available in an 802.11g WLAN?
a. 23 c. 3
b. 11 d. 8

10. Why is the SIFS time in the 802.11g standard effectively extended to 16 microseconds?
a. for compatibility with 802.11a c. to allow 802.11n devices on the network
b. to account for quiet time d. to achieve data rates higher than 11 Mbps

11. Which of the following is correct about antenna diversity?
a. it is the cornerstone of the 802.11n technology c. it increases bandwidth while decreasing range
b. it is two radios and one antenna d. it is two antennas with one radio

12. What do 802.11n devices employ to direct a transmission back to the device from which a frame was received?
a. spatial multiplexing c. MIMO
b. beamforming d. antenna diversity

13. What is the maximum radio configuration for 802.11n devices?
a. 3 transmitters, 3 receivers c. 4 transmitters, 4 receivers
b. 6 transmitters, 4 receivers d. 4 transmitters, 3 receivers

14. How much bandwidth do 802.11n devices utilize when running at speeds up to 300 Mbps?
a. 20 MHz c. 40 MHz
b. 22 MHz d. 44 MHz

15. What is the purpose of a guard band?
a. help prevent adjacent channel interference c. helps prevent outside EM interference
b. help prevent co-channel interference d. helps prevent intersymbol interference

16. What 802.11n mode of operation is referred to as greenfield?
a. transmitting in non-HT mode with 802.11a/g devices c. transmitting with only HT devices
b. transmitting in mixed HT/non-HT devices d. transmitting at a faster speed than receiving

17. Which HT operation mode is used when one or more non-HT devices are associated with an HT AP and supports devices at 20 or 40 MHz?
a. Mode 0 c. Mode 2
b. Mode 1 d. Mode 3

18. Which IEEE standard supports QoS and enables prioritization of frames in DCF?
a. 802.11f c. 802.11d
b. 802.11e d. 802.11c

19. What 802.11 standard under development uses up to 160 MHz bandwidth and can achieve data rates up to 7 Gbps?
a. 802.11bg c. 802.11cd
b. 802.11ac d. 802.11ga

20. What type of device can you deploy to allow client WLAN connectivity when the main AP is out of range?
a. bridge c. monitor
b. controller d. router

COMPLETION

1. __________________ distortion occurs when the receiving device gets the same signal from several different directions at different times.

2. The _______________ interval prevents a new symbol from arriving at the receiver before the last multipath signal reaches the receiver’s antenna.

3. AP _____________________ is a security problem that takes advantage of the fact that clients authenticate with the AP but not vice versa.

4. The strength of encryption relies on keeping the __________ secret as well as its length.

5. 802.1X uses the Extensible ________________ Protocol for relaying access requests between a wireless device, the AP, and the RADIUS server.

MATCHING

a. co-channel interference f. reduced interframe space
b. CTS-to-self g. spatial multiplexing
c. guard band h. symbol
d. intersymbol interference i. TKIP
e. pre-shared key j. wireless controller

1. a 128-bit key used by WPA

2. interference between two devices configured to use the same frequency channel

3. a change in the signal, also known as a baud

4. a 2-microsecond interframe space that can be used in 802.11n networks

5. the unused frequency space between two adjacent channels

6. a security protocol used in WPA that provides per packet key-mixing

7. a coordination method used by 802.11g devices that prevents 802.11 and 802.11b devices that do not “understand” OFDM from attempting to initiate a transmission

8. a transmission technique that uses multiple radios and multiple antennas to send different parts of the same message simultaneously

9. devices that make it much easier to manage large WLANs by implementing most of the functions of an AP

10. caused when the beginning of a symbol arrives at the receiver antenna while multipath reflections from the previous symbol are still reaching the antenna

SHORT ANSWER

1. What is the U-NII frequency band and WLAN standard uses it?

2. Describe how 802.11a uses the U-NII-1, U-NII-2, and U-NII-2 extended bands.

3. What are the two mandatory and two optional transmission modes defined in the 802.11g PHY layer?

4. What are the three parts of an 802.11a PLCP frame? Describe them briefly.

5. Describe the approach that 802.11n (HT) takes to the implementation of the PHY layer.

6. What is MIMO technology? Include beamforming and spatial multiplexing in your answer.

7. What is the channel configuration of 802.11n and how does it help achieve higher data rates?

8. What is the guard interval and what does it help prevent?

9. What are wireless controllers and why are they important in WLANs?

10. What is 802.11i and what aspect of WLANs does it deal with?

CIS 513 Week 11 Final Exam – Strayer University New

CIS/513 Week 11 Final Exam – Strayer New

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-513-Final-Exam-Week-11-Strayer-NEW-CIS513W11E.htm

 

Chapters 5 Through 8

Chapter 5 – Wireless Personal Area Networks

TRUE/FALSE

1. WPAN technologies are designed to connect devices that are typically up to 10 meters apart.

2. One of the advantages of WPAN technologies is their conservative use of battery power.

3. The first step in the Bluetooth pairing process is the paging procedure.

4. A reduced-function device can only connect to one full-function device on the network.

5. Bluetooth uses a challenge-response strategy for device authentication.

MULTIPLE CHOICE

1. Which of the following is NOT a likely application for WPAN technologies?
a. home control systems c. industrial control systems
b. video streaming d. security systems

2. Which of the following is true about WPAN standards?
a. IEEE developed standards for protocols above layer 2 c. IEEE 802.15.1 is the Bluetooth standard
b. industry alliances developed specifications for layers 1 and 2 d. 802.16n is the ZigBee standard

3. Which of the following is true about the OSI model and IEEE 802?
a. the PMD is part of the Data Link layer c. the LLC is part of the Physical layer
b. the PLCP formats data received from the MAC d. the MAC layer is responsible for establishing connectivity to the local network

4. Which radio frequency band does Bluetooth use?
a. 2.4 GHz ISM c. 2.0 GHz ISM
b. 5.0 GHz ISM d. 4.2 GHz ISM

5. Which of the following is true about the Bluetooth protocol stack?
a. the L2CAP sits between Baseband and RF c. Link Manager communicates directly with the Physical Radio
b. the Baseband layer sits atop the RF layer d. The RF layer communicates between the Link Manager and L2CAP

6. What feature available in some Bluetooth devices increases data rates to 2.1 or 3 Mbps?
a. Link Manager c. L2CAP
b. radio module d. EDR

7. Which Bluetooth power class allows transmission ranges up to 330 feet?
a. Power Class 1 c. Power Class 3
b. Power Class 2 d. Power Class 4

8. Bluetooth 1.x uses a variation of which modulation technique?
a. PSK c. FSK
b. ASK d. GSK

9. What feature of Bluetooth version 3.0 uses a separate radio module that transmits using the same methods as IEEE 802.11?
a. BLE c. AMP
b. ULP d. NFC

10. Which transmission technique is used by Bluetooth devices?
a. Narrowband c. DHSS
b. FHSS d. UWB

11. Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a minimum of interference?
a. adaptive frequency hopping c. alternate MAC/PHY
b. frequency hopping spread spectrum d. Bluetooth low energy

12. What is created when a Bluetooth network has one master and at least one slave using the same channel?
a. scatternet c. piconet
b. wi-fi net d. bluenet

13. How is the master device determined in a Bluetooth network?
a. the device with the lowest address number c. the first device to send out an inquiry message to discover other devices
b. the device with the highest priority hop sequence on the piconet d. the device that carries out a paging procedure and establishes a connection

14. Which of the following is NOT a field in a Bluetooth frame?
a. Access code c. Header
b. Frame check sequence d. Payload

15. Which of the following is NOT a Bluetooth error correction scheme?
a. 1/3 rate FEC c. ARQ
b. 2/3 rate FEC d. CRC

16. In which Bluetooth power mode is only the slave device’s internal timer running?
a. active mode c. hold mode
b. sniff mode d. park mode

17. Which of the following is true about the ZigBee standard?
a. designed to support mesh networking c. used for larger data transfers than Bluetooth
b. replaced an existing global, open standard d. operates in the 5.0 and 6.5 GHz ISM bands

18. Which layer in a ZigBee device is responsible for detecting the presence of an RF signal in the currently selected channel?
a. LLC c. MAC
b. PHY d. Upper

19. Which task is the MAC layer responsible for in an 802.15.4 device?
a. turning the radio transceiver on and off c. association and disassociation
b. analyzing link quality d. selecting a frequency channel for operation

20. Which type of ZigBee device controls the network in a star topology?
a. all end-node devices c. full-function device
b. reduced function device d. PAN coordinator

COMPLETION

1. In a ZigBee tree topology, if a child loses it connection with its FFD, it becomes a(n) _____________.

2. ________________ is an 802.15.4-based technology that implements IPv6 on WPANs and supports mesh networking.

3. A ______________ authority is a private company that verifies the authenticity of each user in order to discourage fraud.

4. In Bluetooth Encryption Mode ______, all traffic is encrypted.

5. 802.15.4 provides for _______________ integrity, a technique that uses a message integrity code.

MATCHING

a. 8-DPSK f. inquiry procedure
b. ACL link g. MIC
c. ARQ h. modulation index
d. binding i. sequential freshness
e. guaranteed time slots j. superframe

1. a reserved period for critical devices to transmit priority data

2. a simple method of phase shift keying that uses eight degrees of phase to encode tribits

3. the process of establishing a relationship between endpoints in a ZigBee network

4. a security service available in 802.15.4 and used by the receiving device

5. a process that enables a device to discover which devices are in range

6. a packet-switched link that is used for data transmissions

7. the amount that the frequency varies

8. an error-correction scheme that continuously retransmits until an acknowledgment is received or a timeout value is exceeded

9. a mechanism for managing transmissions in a piconet

10. a code composed of a subset of the data, the length of the data, and the symmetric key

SHORT ANSWER

1. What are the three types of addresses used in a Bluetooth piconet? Describe each.

2. Describe the two types of physical links between Bluetooth devices.

3. What are the two types of network access used in IEEE 802.15.3 networks? Describe them.

4. List three of the seven tasks the 802.15.4 MAC layer is responsible for.

5. What are the four levels of addresses for identifying devices within a ZigBee PAN?

6. What is a cluster tree topology and how do they compare to mesh networks?

7. How is power management implemented in a ZigBee network?

8. Describe the WirelessHART technology.

9. List and describe the three levels of Bluetooth security.

10. What is the process that ZigBee WPANs use for authentication and encryption? Describe how it works.

Chapter 6 – High-Rate Wireless Personal Area Networks

TRUE/FALSE

1. IEEE 802.15 covers all the WPAN working groups.

2. The WHDI consortium developed the WHDI specification primarily for the delivery of data produced from online database queries.

3. The piconet coordinator in a WirelessHD network should be a battery operated device for mobility.

4. The DSPS power saving mode allows devices to sleep for long periods of time until they choose to wake up and listen to a beacon.

5. UWB is capable of handling multiple data streams, including HD television.

MULTIPLE CHOICE

1. Which IEEE standard enables multimedia connectivity between mobile and fixed consumer devices within the home?
a. 802.15.3c c. 802.15.1
b. 802.15.5 d. 802.15.4

2. In which frequency range does WHDI operate?
a. 2.4 GHz c. 5 GHz
b. 800 MHz d. 400 KHz

3. Which of the following is true about WiGig?
a. it is compatible with 802.11ac c. makes use of technology designed by AMIMON
b. it requires layer 3 and 4 protocols for audiovisual support d. it has adopted the 802.15.3c standard for multimedia distribution

4. What does WiGig use to maintain reliable connections at very high frequencies?
a. single-carrier modulation c. OFDM
b. beamforming d. protocol adaptation layers

5. What technique does WirelessHD employ to support data rates over 25 Gbps?
a. LRP c. HDMI
b. spatial multiplexing d. beamforming

6. Which of the following is true about a WVAN piconet?
a. the piconet relies on an access point c. large non-mobile devices like TVs are not part of a piconet
b. the PNC is typically a mobile device such as a tablet computer d. the PNC is the first sink device in the area

7. Which of the following is described as a piconet that has its own PNC but depends on the original piconet’s PNC to allocate a private block of time when its devices are allowed to transmit?
a. child piconet c. neighbor piconet
b. parent piconet d. subordinate piconet

8. Which of the following is NOT an HR WPAN feature provided by the 802.15.3 MAC layer?
a. uses a one-octet device ID c. data transport includes QoS
b. PNC can be queried about other devices d. infrastructure mode networking is supported

9. Which part of an 802.15.3 superframe is used for association and command communication?
a. contention access period c. channel time allocation period
b. beacon d. management channel time allocation

10. What type of transmission method does an 802.15.3 piconet use during the CTAP?
a. SDMA c. FDMA
b. TDMA d. CDMA

11. Which field of the 802.15.3 MAC frame format is used to reassemble a file in the correct sequence?
a. Frame control c. Fragmentation control
b. Piconet ID d. Stream index

12. Which 802.15.3 power-saving methods allows devices to sleep for the duration of several superframes and allows them to wake up in the middle of a superframe to transmit or receive data?
a. PSPS c. PSPS
b. APS d. APCI

13. Which radio band does the 802.15.3c standard use?
a. 5.0 GHz c. 2.4 GHz
b. 60 GHz d. p00 MHz

14. How many channels and what is the width of each 802.15.3c channel?
a. 4, 2 GHz c. 11, 25 MHz
b. 6, 200 MHz d. 14, 50 MHz

15. Which of the following is NOT a 802.15.3c PHY layer enhancement?
a. passive scanning c. channel energy detection
b. parity bit error detection d. transmit power control

16. The RF modulation techniques used for 802.15.3c are variations of which of the following?
a. QAM and PSK c. NRZ-L and NRZ-I
b. FSK and ASK d. BPSK and QPSK

17. In the WirelessHD specification 1.1, Which of the following is NOT a function of the higher protocol layers?
a. video format selection c. device discovery
b. clock synchronization d. video and audio encoding and decoding

18. What application has UWB been used for since the 1960’s?
a. video streaming c. cellular phone towers
b. ground-penetrating radar d. automobile speed detectors

19. What term is used for the technique in which the amplitude, polarity, or position of an analog pulse represents either a 1 or a 0?
a. biphase modulation c. direct-sequence UWB
b. mesh networking d. impulse modulation

20. What type of attack on a Bluetooth device can access contact lists without the user’s knowledge?
a. bluejacking c. bluesnarfing
b. bluespoofing d. blueDoS

COMPLETION

1. The IEEE 802.15.3c standard enables ________________ connectivity between mobile and fixed consumer devices within the home.

2. The WHDI specification is designed to mirror the screens of multiple devices to the TV screen with the use of ____________.

3. _____________________ uses multiple radios and antennas to steer a signal in the direction of the receiver.

4. ZigBee uses a(n) _______________ encryption key for network-wide communications.

5. Security for IEEE 802.15.3 HR WPANs is based on ________________, a symmetric key encryption mechanism.

MATCHING

a. biphase modulation f. isochronous
b. channel time allocations g. MCTA
c. contention access period h. PNC
d. D-WVAN i. spatial multiplexing
e. H-WVAN j. superframe

1. periods of time allocated by the PNC to a specific device for prioritizing communications

2. the home or parent WVAN

3. time periods used for communication between the devices and the PNC

4. a mechanism used to communicate commands or any asynchronous data that may be present in a superframe

5. a technique that uses multiple radios and multiple antennas to transmit and receive different parts of the same PHY frame

6. a time-dependent transmission that must occur every frame or every so many
frames to maintain the quality of the connection

7. a mechanism for managing transmissions in a piconet

8. a device that provides all the basic communications timing in an 802.15.3 piconet

9. uses a half-cycle positive analog pulse to represent a 1 and a half-cycle negative analog pulse to represent a 0

10. a secondary wireless video area network that operates in a different frequency channel

SHORT ANSWER

1. Provide a summary of the purpose and application for IEEE 802.15.3c.

2. List four potential HR WPAN applications.

3. What was the primary purpose the WHDI consortium developed the WHDI specification?

4. What do the PALs do for WiGig?

5. What are the three sections the WirelessHD specification divides the PHY layer into?

6. Describe child and neighbor piconets.

7. Describe the three parts of an 802.15.3 superframe.

8. What information is contained in the Frame control field of an 802.15.3 frame?

9. List and describe the two modes of security for IEEE 802.15.3 HR WPANs.

10. Briefly discuss the potential of spectrum conflict with WPANs.

Chapter 7 – Low-Speed Wireless Local Area Networks

TRUE/FALSE

1. A wireless residential gateway provide better security than connecting a computer directly to the Internet.

2. The range of an AP base station is approximately 375 feet in an environment with no obstructions and little interference.

3. When transmitting above 2 Mbps using DSSS in an 802.11b network, a Barker code is used.

4. The PHY layer of the 802.11b standard provides functionality for a client to join a WLAN and stay connected.

5. A SIFS occurs immediately after the transmission of frames and no device is allowed to transmit during the SIFS.

MULTIPLE CHOICE

1. Which of the following is NOT true about wireless NICs?
a. they change the computer’s internal data from serial to parallel before transmitting c. they have an antenna instead of a cable port
b. you can connect an external wireless NIC to a USB port d. notebook computers often use Mini PCI cards for wireless NICs

2. Which component found in an access point is NOT found in a wireless NIC?
a. radio transmitter c. radio receiver
b. RJ-45 interface d. antenna

3. Aside from acting as the base station for the wireless network, what other function does an AP perform?
a. it routes packets c. proxy server
b. acts as a bridge d. it performs as a firewall

4. Where does an AP that it using PoE get its DC power from?
a. an AC outlet c. UTP cables
b. a built-in AC/DC converter d. high-frequency radio waves

5. If three friends each have a laptop computer and they want to exchange files wirelessly but nobody has an AP, what should they do?
a. use Ad hoc mode c. use the Basic Service Set
b. use infrastructure mode d. use the Extended Service Set

6. What is the term used for when a client finds a different AP that can provide a better-quality signal and then associates with the new AP?
a. reassociation c. transfer
b. reconnect d. handoff

7. Which of the following is NOT a field in the 802.11b PLCP frame?
a. Start frame delimiter c. Signal data rate
b. Source address d. Length

8. Which field of the PLCP frame indicates how long in microseconds the data portion of the frame is?
a. Start frame delimiter c. Service
b. Signal data rate d. Length

9. What is the primary job of the PMD sublayer?
a. translate binary 1s and 0s into radio signals c. reformat the data received from the MAC layer
b. evaluate the Header error check field d. implement a channel access method

10. What is the maximum throughput a device can achieve operating on an 802.11b network?
a. about 11 Mbps c. about 54 Mbps
b. about 5.5 Mbps d. about 27 Mbps

11. What is the period of time devices must wait after the medium is clear before attempting to transmit?
a. collision timeframe c. backoff interval
b. signal data rate d. synchronization period

12. What is the RTS/CTS protocol designed to reduce or prevent?
a. negative acknowledgements c. collisions
b. CRC errors d. handshakes

13. With which channel access method does the AP ask each computer if it wants to transmit?
a. point coordinated function c. CSMA/CD
b. CSMA/CA d. virtual carrier sensing

14. In active scanning, what does the client do initially to start the association process?
a. poll the access point c. send a beacon with the requested SSID
b. send a probe frame d. transmit an associate request frame

15. What is the last frame sent to successfully conclude a client’s attempt to associate using active scanning?
a. scan reply c. probe response
b. synchronize acknowledgement d. associate response

16. Which of the following is true about client’s associating with an AP?
a. an AP can reject the request based on the client MAC address c. a client can reassociate with another AP in a BSS
b. a client can be associated to multiple APs simultaneously for fault tolerance d. if a client is not preconfigured for a specific AP, it will not attempt to associate

17. Which of the following is NOT true about WLAN power management?
a. power management is transparent to applications c. the AP uses timestamps to maintain synchronization
b. 802.11b devices use power management in ad hoc mode d. the AP keeps a record of which client’s are sleeping

18. What is the list of devices called that an AP sends in a beacon that indicates which clients have buffered frames waiting?
a. sleep mode identifier c. traffic indication map
b. buffered frames allocation d. packet delivery list

19. Which of the following is a function performed by MAC management frames?
a. request-to-send c. reassociation request
b. transmit data to the client d. acknowledgement

20. What is the time period during which all devices must wait between transmissions of data frames?
a. Short Interframe Space c. Idle Requirement Period
b. DCF Interframe Space d. Transmission Control Period

COMPLETION

1. In the place of a port for a cable connection, a wireless NIC has a(n) ______________.

2. An AP acts as a(n) ____________ between the wired and wireless networks.

3. ____________________ mode consists of at least one wireless client connected to a single AP.

4. Once the _____________ has formatted the frame, it passes the frame to the PMD sublayer.

5. When a client is finishing transmitting, it begins listening for a(n) ________________ from the receiving device.

MATCHING

a. ACK f. control frames
b. active scanning g. DCF
c. associate request frame h. fragmentation
d. BSS i. management frames
e. channel access methods j. passive scanning

1. a WLAN mode that consists of at least one wireless client and one AP

2. a frame sent by a client to an AP that contains the client’s capabilities and supported rates

3. MAC frames that assist in delivering the frames that contain data

4. the process of listening to each available channel for a set period of time

5. the division of data to be transmitted from one large frame into several smaller frames

6. a procedure used to reduce collisions by requiring the receiving station to send an explicit packet back to the sending station

7. the default channel access method in IEEE 802.11 WLANs

8. MAC frames that are used, for example, to set up the initial communications between a client and the AP

9. the process of sending frames to gather information

10. the different ways of sharing resources in a network environment

SHORT ANSWER

1. What are the four steps involved in wireless NIC transmission?

2. Describe the two basic functions of an AP.

3. What is infrastructure mode? Include a discussion of BSS and ESS in your answer.

4. What is a drawback of an ESS WLAN with respect to roaming users? What is a remedy to this drawback?

5. Describe the Physical layer of the 802.11b standard.

6. List the three parts of the PLCP frame.

7. How does CSMA/CA in DCF handle media contention?

8. How does RTS/CTS work?

9. Describe the six basic rules of communication in an 802.11 network.

10. Describe the six steps that occur if two devices have frames to transmit.

Chapter 8 – High-Speed WLANs and WLAN Security

TRUE/FALSE

1. The 802.11a standard maintains the same MAC layer functions as 802.11b WLANs.

2. Increasing data transmission speed through more complex modulation schemes makes multipath distortion worse.

3. The 4-bit Rate field in an 802.11a PLCP frame specifies the speed at which the Data field will be transmitted.

4. Wireless controllers incorporate most AP functions including the radio.

5. VPNs encrypt a connection for security and use very few processing resources.

MULTIPLE CHOICE

1. Which of the following 802.11 standards uses U-NII bands and does not use ISM bands?
a. 802.11b c. 802.11g
b. 802.11a d. 802.11n

2. Which of the U-NII bands is approved for outdoor use?
a. U-NII-1 c. U-NII-2 Extended
b. U-NII-2 d. U-NII-3

3. What is the multiplexing technique used by 802.11a to help solve the multipath distortion problem?
a. QPSK c. FEC
b. OFDM d. PBCC

4. How many bits per symbol can be transmitted using 16-QAM?
a. 16 c. 4
b. 2 d. 8

5. Which wireless data rate uses 64-level quadrature amplitude modulation, transmitting over 48 subcarriers?
a. 11 Mbps c. 24 Mbps
b. 2 Mbps d. 54 Mbps

6. Which layer defines the characteristics of the wireless medium?
a. PLCP c. LLC
b. PMD d. MAC

7. Which field in an 802.11a PLCP frame are used to initialize part of the transmitter and receiver circuits?
a. Tail c. Service
b. Pad d. Parity

8. What is the disadvantage of an 802.11a WLAN compared to an 802.11b WLAN?
a. shorter range c. more interference sources
b. higher error rate d. lower bandwidth

9. How many non-overlapping channels are available in an 802.11g WLAN?
a. 23 c. 3
b. 11 d. 8

10. Why is the SIFS time in the 802.11g standard effectively extended to 16 microseconds?
a. for compatibility with 802.11a c. to allow 802.11n devices on the network
b. to account for quiet time d. to achieve data rates higher than 11 Mbps

11. Which of the following is correct about antenna diversity?
a. it is the cornerstone of the 802.11n technology c. it increases bandwidth while decreasing range
b. it is two radios and one antenna d. it is two antennas with one radio

12. What do 802.11n devices employ to direct a transmission back to the device from which a frame was received?
a. spatial multiplexing c. MIMO
b. beamforming d. antenna diversity

13. What is the maximum radio configuration for 802.11n devices?
a. 3 transmitters, 3 receivers c. 4 transmitters, 4 receivers
b. 6 transmitters, 4 receivers d. 4 transmitters, 3 receivers

14. How much bandwidth do 802.11n devices utilize when running at speeds up to 300 Mbps?
a. 20 MHz c. 40 MHz
b. 22 MHz d. 44 MHz

15. What is the purpose of a guard band?
a. help prevent adjacent channel interference c. helps prevent outside EM interference
b. help prevent co-channel interference d. helps prevent intersymbol interference

16. What 802.11n mode of operation is referred to as greenfield?
a. transmitting in non-HT mode with 802.11a/g devices c. transmitting with only HT devices
b. transmitting in mixed HT/non-HT devices d. transmitting at a faster speed than receiving

17. Which HT operation mode is used when one or more non-HT devices are associated with an HT AP and supports devices at 20 or 40 MHz?
a. Mode 0 c. Mode 2
b. Mode 1 d. Mode 3

18. Which IEEE standard supports QoS and enables prioritization of frames in DCF?
a. 802.11f c. 802.11d
b. 802.11e d. 802.11c

19. What 802.11 standard under development uses up to 160 MHz bandwidth and can achieve data rates up to 7 Gbps?
a. 802.11bg c. 802.11cd
b. 802.11ac d. 802.11ga

20. What type of device can you deploy to allow client WLAN connectivity when the main AP is out of range?
a. bridge c. monitor
b. controller d. router

COMPLETION

1. __________________ distortion occurs when the receiving device gets the same signal from several different directions at different times.

2. The _______________ interval prevents a new symbol from arriving at the receiver before the last multipath signal reaches the receiver’s antenna.

3. AP _____________________ is a security problem that takes advantage of the fact that clients authenticate with the AP but not vice versa.

4. The strength of encryption relies on keeping the __________ secret as well as its length.

5. 802.1X uses the Extensible ________________ Protocol for relaying access requests between a wireless device, the AP, and the RADIUS server.

MATCHING

a. co-channel interference f. reduced interframe space
b. CTS-to-self g. spatial multiplexing
c. guard band h. symbol
d. intersymbol interference i. TKIP
e. pre-shared key j. wireless controller

1. a 128-bit key used by WPA

2. interference between two devices configured to use the same frequency channel

3. a change in the signal, also known as a baud

4. a 2-microsecond interframe space that can be used in 802.11n networks

5. the unused frequency space between two adjacent channels

6. a security protocol used in WPA that provides per packet key-mixing

7. a coordination method used by 802.11g devices that prevents 802.11 and 802.11b devices that do not “understand” OFDM from attempting to initiate a transmission

8. a transmission technique that uses multiple radios and multiple antennas to send different parts of the same message simultaneously

9. devices that make it much easier to manage large WLANs by implementing most of the functions of an AP

10. caused when the beginning of a symbol arrives at the receiver antenna while multipath reflections from the previous symbol are still reaching the antenna

SHORT ANSWER

1. What is the U-NII frequency band and WLAN standard uses it?

2. Describe how 802.11a uses the U-NII-1, U-NII-2, and U-NII-2 extended bands.

3. What are the two mandatory and two optional transmission modes defined in the 802.11g PHY layer?

4. What are the three parts of an 802.11a PLCP frame? Describe them briefly.

5. Describe the approach that 802.11n (HT) takes to the implementation of the PHY layer.

6. What is MIMO technology? Include beamforming and spatial multiplexing in your answer.

7. What is the channel configuration of 802.11n and how does it help achieve higher data rates?

8. What is the guard interval and what does it help prevent?

9. What are wireless controllers and why are they important in WLANs?

10. What is 802.11i and what aspect of WLANs does it deal with?

CIS 513 Week 10 Term Paper – Strayer University New

CIS/513 Week 10 Term Paper – Strayer New

Click on The Link Below To Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-513-Week-10-Term-Paper-Strayer-New-CIS513TP.htm

 

Term Paper: Wireless Deployment Plan

This assignment consists of two (3) sections: a written Wireless Development Plan, a graphically depicted Wireless Network Architecture, and a Wireless Project Implementation Plan created through the use of MS Project. You must submit the three (3) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

The use of specific software has been suggested; however, equivalents including but not limited to OpenOffice and Dia are also permitted. If equivalent tools are used, files must be saved and submitted for grading using extensions that are readable by their equivalent Microsoft Windows edition. Assignment submissions that fail to follow this request may result in a reduced grade.

Any network or information system deployment must be carefully and thoroughly planned and implemented. Failures to thoroughly plan the implementation of wireless networks have led to many project failures due to lack of support, technical issues, and security issues. During this course, you have covered many wireless support topics, technical considerations and issues, and security considerations and issues.

Section 1: Wireless Deployment Plan
Required Format (MS Word File)
1. Write a six to eight (6-8) page wireless deployment plan for an education institution with a single campus but with multiple buildings on that campus.
a. The wireless deployment plan must include, but is not limited to, the following items:
i. Wireless Deployment Plan Overview
ii. Purpose and Scope
iii. Wireless Network Equipment and Devices
iv. Wireless Network Device Configuration
v. Wireless Client Configuration and Access
vi. Wireless Network Staffing, Training, and Support Requirements
vii. Wireless Network Security Requirements
viii. Terms and Definitions
b. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Section 1 of your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Section 2: Wireless Network Architecture
Required Format (MS Visio or equivalent)
2. Use Microsoft Visio or an open source alternative, such as Dia to develop a network architecture diagram depicting the wireless networking equipment, security devices, and architecture for the corporate wireless network.
Section 3: Wireless Project Implementation Plan
Required Format (MS Project or equivalent)
1. Use MS Project or an Open Source alternative, such as Open Project to develop a project plan depicting the project tasks, task durations, predecessors, and resources needed to implement the wireless network.

CIS 513 Week 8 Assignment 3 – Strayer University New

CIS/513 Week 8 Assignment 3 – Strayer New

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-513-Assignment-3-Strayer-New-CIS513A3.htm

 

Assignment 3: Wireless Security Policy

Implementing wireless technologies involves technical and management issues or considerations that have strategic business implications within organizations. Thus, it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

Write a four to six (4-6) page wireless security policy for a medium-sized banking organization using the following structure:
1. Wireless Security Policy
a. Wireless Security Policy Overview
b. Purpose and Scope
c. Applicability
d. Wireless Network Security Requirements
e. Wireless Network Access Requirements
f. Wireless Device Requirements
g. Wireless Standards Supported by the Organization
h. Ethical Guidelines Associated with Wireless Networks in the Organization
i. Policy Enforcement
j. Terms and Definitions
2. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 513 Week 8 Assignment 3 – Strayer University New

CIS/513 Week 8 Assignment 3 – Strayer New

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://www.hwgala.com/CIS-513-Assignment-3-Strayer-New-CIS513A3.htm

 

Assignment 3: Wireless Security Policy

Implementing wireless technologies involves technical and management issues or considerations that have strategic business implications within organizations. Thus, it is critical that organizations adopting wireless technologies develop the appropriate security policies governing wireless technologies and operations within their organization.

Write a four to six (4-6) page wireless security policy for a medium-sized banking organization using the following structure:
1. Wireless Security Policy
a. Wireless Security Policy Overview
b. Purpose and Scope
c. Applicability
d. Wireless Network Security Requirements
e. Wireless Network Access Requirements
f. Wireless Device Requirements
g. Wireless Standards Supported by the Organization
h. Ethical Guidelines Associated with Wireless Networks in the Organization
i. Policy Enforcement
j. Terms and Definitions
2. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 513 Week 11 Final Exam – Strayer University New

CIS/513 Week 11 Final Exam – Strayer New

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://budapp.net/CIS-513-Final-Exam-Week-11-Strayer-NEW-CIS513W11E.htm

 

Chapters 5 Through 8

Chapter 5 – Wireless Personal Area Networks

TRUE/FALSE

1. WPAN technologies are designed to connect devices that are typically up to 10 meters apart.

2. One of the advantages of WPAN technologies is their conservative use of battery power.

3. The first step in the Bluetooth pairing process is the paging procedure.

4. A reduced-function device can only connect to one full-function device on the network.

5. Bluetooth uses a challenge-response strategy for device authentication.

MULTIPLE CHOICE

1. Which of the following is NOT a likely application for WPAN technologies?
a. home control systems c. industrial control systems
b. video streaming d. security systems

2. Which of the following is true about WPAN standards?
a. IEEE developed standards for protocols above layer 2 c. IEEE 802.15.1 is the Bluetooth standard
b. industry alliances developed specifications for layers 1 and 2 d. 802.16n is the ZigBee standard

3. Which of the following is true about the OSI model and IEEE 802?
a. the PMD is part of the Data Link layer c. the LLC is part of the Physical layer
b. the PLCP formats data received from the MAC d. the MAC layer is responsible for establishing connectivity to the local network

4. Which radio frequency band does Bluetooth use?
a. 2.4 GHz ISM c. 2.0 GHz ISM
b. 5.0 GHz ISM d. 4.2 GHz ISM

5. Which of the following is true about the Bluetooth protocol stack?
a. the L2CAP sits between Baseband and RF c. Link Manager communicates directly with the Physical Radio
b. the Baseband layer sits atop the RF layer d. The RF layer communicates between the Link Manager and L2CAP

6. What feature available in some Bluetooth devices increases data rates to 2.1 or 3 Mbps?
a. Link Manager c. L2CAP
b. radio module d. EDR

7. Which Bluetooth power class allows transmission ranges up to 330 feet?
a. Power Class 1 c. Power Class 3
b. Power Class 2 d. Power Class 4

8. Bluetooth 1.x uses a variation of which modulation technique?
a. PSK c. FSK
b. ASK d. GSK

9. What feature of Bluetooth version 3.0 uses a separate radio module that transmits using the same methods as IEEE 802.11?
a. BLE c. AMP
b. ULP d. NFC

10. Which transmission technique is used by Bluetooth devices?
a. Narrowband c. DHSS
b. FHSS d. UWB

11. Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a minimum of interference?
a. adaptive frequency hopping c. alternate MAC/PHY
b. frequency hopping spread spectrum d. Bluetooth low energy

12. What is created when a Bluetooth network has one master and at least one slave using the same channel?
a. scatternet c. piconet
b. wi-fi net d. bluenet

13. How is the master device determined in a Bluetooth network?
a. the device with the lowest address number c. the first device to send out an inquiry message to discover other devices
b. the device with the highest priority hop sequence on the piconet d. the device that carries out a paging procedure and establishes a connection

14. Which of the following is NOT a field in a Bluetooth frame?
a. Access code c. Header
b. Frame check sequence d. Payload

15. Which of the following is NOT a Bluetooth error correction scheme?
a. 1/3 rate FEC c. ARQ
b. 2/3 rate FEC d. CRC

16. In which Bluetooth power mode is only the slave device’s internal timer running?
a. active mode c. hold mode
b. sniff mode d. park mode

17. Which of the following is true about the ZigBee standard?
a. designed to support mesh networking c. used for larger data transfers than Bluetooth
b. replaced an existing global, open standard d. operates in the 5.0 and 6.5 GHz ISM bands

18. Which layer in a ZigBee device is responsible for detecting the presence of an RF signal in the currently selected channel?
a. LLC c. MAC
b. PHY d. Upper

19. Which task is the MAC layer responsible for in an 802.15.4 device?
a. turning the radio transceiver on and off c. association and disassociation
b. analyzing link quality d. selecting a frequency channel for operation

20. Which type of ZigBee device controls the network in a star topology?
a. all end-node devices c. full-function device
b. reduced function device d. PAN coordinator

COMPLETION

1. In a ZigBee tree topology, if a child loses it connection with its FFD, it becomes a(n) _____________.

2. ________________ is an 802.15.4-based technology that implements IPv6 on WPANs and supports mesh networking.

3. A ______________ authority is a private company that verifies the authenticity of each user in order to discourage fraud.

4. In Bluetooth Encryption Mode ______, all traffic is encrypted.

5. 802.15.4 provides for _______________ integrity, a technique that uses a message integrity code.

MATCHING

a. 8-DPSK f. inquiry procedure
b. ACL link g. MIC
c. ARQ h. modulation index
d. binding i. sequential freshness
e. guaranteed time slots j. superframe

1. a reserved period for critical devices to transmit priority data

2. a simple method of phase shift keying that uses eight degrees of phase to encode tribits

3. the process of establishing a relationship between endpoints in a ZigBee network

4. a security service available in 802.15.4 and used by the receiving device

5. a process that enables a device to discover which devices are in range

6. a packet-switched link that is used for data transmissions

7. the amount that the frequency varies

8. an error-correction scheme that continuously retransmits until an acknowledgment is received or a timeout value is exceeded

9. a mechanism for managing transmissions in a piconet

10. a code composed of a subset of the data, the length of the data, and the symmetric key

SHORT ANSWER

1. What are the three types of addresses used in a Bluetooth piconet? Describe each.

2. Describe the two types of physical links between Bluetooth devices.

3. What are the two types of network access used in IEEE 802.15.3 networks? Describe them.

4. List three of the seven tasks the 802.15.4 MAC layer is responsible for.

5. What are the four levels of addresses for identifying devices within a ZigBee PAN?

6. What is a cluster tree topology and how do they compare to mesh networks?

7. How is power management implemented in a ZigBee network?

8. Describe the WirelessHART technology.

9. List and describe the three levels of Bluetooth security.

10. What is the process that ZigBee WPANs use for authentication and encryption? Describe how it works.

Chapter 6 – High-Rate Wireless Personal Area Networks

TRUE/FALSE

1. IEEE 802.15 covers all the WPAN working groups.

2. The WHDI consortium developed the WHDI specification primarily for the delivery of data produced from online database queries.

3. The piconet coordinator in a WirelessHD network should be a battery operated device for mobility.

4. The DSPS power saving mode allows devices to sleep for long periods of time until they choose to wake up and listen to a beacon.

5. UWB is capable of handling multiple data streams, including HD television.

MULTIPLE CHOICE

1. Which IEEE standard enables multimedia connectivity between mobile and fixed consumer devices within the home?
a. 802.15.3c c. 802.15.1
b. 802.15.5 d. 802.15.4

2. In which frequency range does WHDI operate?
a. 2.4 GHz c. 5 GHz
b. 800 MHz d. 400 KHz

3. Which of the following is true about WiGig?
a. it is compatible with 802.11ac c. makes use of technology designed by AMIMON
b. it requires layer 3 and 4 protocols for audiovisual support d. it has adopted the 802.15.3c standard for multimedia distribution

4. What does WiGig use to maintain reliable connections at very high frequencies?
a. single-carrier modulation c. OFDM
b. beamforming d. protocol adaptation layers

5. What technique does WirelessHD employ to support data rates over 25 Gbps?
a. LRP c. HDMI
b. spatial multiplexing d. beamforming

6. Which of the following is true about a WVAN piconet?
a. the piconet relies on an access point c. large non-mobile devices like TVs are not part of a piconet
b. the PNC is typically a mobile device such as a tablet computer d. the PNC is the first sink device in the area

7. Which of the following is described as a piconet that has its own PNC but depends on the original piconet’s PNC to allocate a private block of time when its devices are allowed to transmit?
a. child piconet c. neighbor piconet
b. parent piconet d. subordinate piconet

8. Which of the following is NOT an HR WPAN feature provided by the 802.15.3 MAC layer?
a. uses a one-octet device ID c. data transport includes QoS
b. PNC can be queried about other devices d. infrastructure mode networking is supported

9. Which part of an 802.15.3 superframe is used for association and command communication?
a. contention access period c. channel time allocation period
b. beacon d. management channel time allocation

10. What type of transmission method does an 802.15.3 piconet use during the CTAP?
a. SDMA c. FDMA
b. TDMA d. CDMA

11. Which field of the 802.15.3 MAC frame format is used to reassemble a file in the correct sequence?
a. Frame control c. Fragmentation control
b. Piconet ID d. Stream index

12. Which 802.15.3 power-saving methods allows devices to sleep for the duration of several superframes and allows them to wake up in the middle of a superframe to transmit or receive data?
a. PSPS c. PSPS
b. APS d. APCI

13. Which radio band does the 802.15.3c standard use?
a. 5.0 GHz c. 2.4 GHz
b. 60 GHz d. p00 MHz

14. How many channels and what is the width of each 802.15.3c channel?
a. 4, 2 GHz c. 11, 25 MHz
b. 6, 200 MHz d. 14, 50 MHz

15. Which of the following is NOT a 802.15.3c PHY layer enhancement?
a. passive scanning c. channel energy detection
b. parity bit error detection d. transmit power control

16. The RF modulation techniques used for 802.15.3c are variations of which of the following?
a. QAM and PSK c. NRZ-L and NRZ-I
b. FSK and ASK d. BPSK and QPSK

17. In the WirelessHD specification 1.1, Which of the following is NOT a function of the higher protocol layers?
a. video format selection c. device discovery
b. clock synchronization d. video and audio encoding and decoding

18. What application has UWB been used for since the 1960’s?
a. video streaming c. cellular phone towers
b. ground-penetrating radar d. automobile speed detectors

19. What term is used for the technique in which the amplitude, polarity, or position of an analog pulse represents either a 1 or a 0?
a. biphase modulation c. direct-sequence UWB
b. mesh networking d. impulse modulation

20. What type of attack on a Bluetooth device can access contact lists without the user’s knowledge?
a. bluejacking c. bluesnarfing
b. bluespoofing d. blueDoS

COMPLETION

1. The IEEE 802.15.3c standard enables ________________ connectivity between mobile and fixed consumer devices within the home.

2. The WHDI specification is designed to mirror the screens of multiple devices to the TV screen with the use of ____________.

3. _____________________ uses multiple radios and antennas to steer a signal in the direction of the receiver.

4. ZigBee uses a(n) _______________ encryption key for network-wide communications.

5. Security for IEEE 802.15.3 HR WPANs is based on ________________, a symmetric key encryption mechanism.

MATCHING

a. biphase modulation f. isochronous
b. channel time allocations g. MCTA
c. contention access period h. PNC
d. D-WVAN i. spatial multiplexing
e. H-WVAN j. superframe

1. periods of time allocated by the PNC to a specific device for prioritizing communications

2. the home or parent WVAN

3. time periods used for communication between the devices and the PNC

4. a mechanism used to communicate commands or any asynchronous data that may be present in a superframe

5. a technique that uses multiple radios and multiple antennas to transmit and receive different parts of the same PHY frame

6. a time-dependent transmission that must occur every frame or every so many
frames to maintain the quality of the connection

7. a mechanism for managing transmissions in a piconet

8. a device that provides all the basic communications timing in an 802.15.3 piconet

9. uses a half-cycle positive analog pulse to represent a 1 and a half-cycle negative analog pulse to represent a 0

10. a secondary wireless video area network that operates in a different frequency channel

SHORT ANSWER

1. Provide a summary of the purpose and application for IEEE 802.15.3c.

2. List four potential HR WPAN applications.

3. What was the primary purpose the WHDI consortium developed the WHDI specification?

4. What do the PALs do for WiGig?

5. What are the three sections the WirelessHD specification divides the PHY layer into?

6. Describe child and neighbor piconets.

7. Describe the three parts of an 802.15.3 superframe.

8. What information is contained in the Frame control field of an 802.15.3 frame?

9. List and describe the two modes of security for IEEE 802.15.3 HR WPANs.

10. Briefly discuss the potential of spectrum conflict with WPANs.

Chapter 7 – Low-Speed Wireless Local Area Networks

TRUE/FALSE

1. A wireless residential gateway provide better security than connecting a computer directly to the Internet.

2. The range of an AP base station is approximately 375 feet in an environment with no obstructions and little interference.

3. When transmitting above 2 Mbps using DSSS in an 802.11b network, a Barker code is used.

4. The PHY layer of the 802.11b standard provides functionality for a client to join a WLAN and stay connected.

5. A SIFS occurs immediately after the transmission of frames and no device is allowed to transmit during the SIFS.

MULTIPLE CHOICE

1. Which of the following is NOT true about wireless NICs?
a. they change the computer’s internal data from serial to parallel before transmitting c. they have an antenna instead of a cable port
b. you can connect an external wireless NIC to a USB port d. notebook computers often use Mini PCI cards for wireless NICs

2. Which component found in an access point is NOT found in a wireless NIC?
a. radio transmitter c. radio receiver
b. RJ-45 interface d. antenna

3. Aside from acting as the base station for the wireless network, what other function does an AP perform?
a. it routes packets c. proxy server
b. acts as a bridge d. it performs as a firewall

4. Where does an AP that it using PoE get its DC power from?
a. an AC outlet c. UTP cables
b. a built-in AC/DC converter d. high-frequency radio waves

5. If three friends each have a laptop computer and they want to exchange files wirelessly but nobody has an AP, what should they do?
a. use Ad hoc mode c. use the Basic Service Set
b. use infrastructure mode d. use the Extended Service Set

6. What is the term used for when a client finds a different AP that can provide a better-quality signal and then associates with the new AP?
a. reassociation c. transfer
b. reconnect d. handoff

7. Which of the following is NOT a field in the 802.11b PLCP frame?
a. Start frame delimiter c. Signal data rate
b. Source address d. Length

8. Which field of the PLCP frame indicates how long in microseconds the data portion of the frame is?
a. Start frame delimiter c. Service
b. Signal data rate d. Length

9. What is the primary job of the PMD sublayer?
a. translate binary 1s and 0s into radio signals c. reformat the data received from the MAC layer
b. evaluate the Header error check field d. implement a channel access method

10. What is the maximum throughput a device can achieve operating on an 802.11b network?
a. about 11 Mbps c. about 54 Mbps
b. about 5.5 Mbps d. about 27 Mbps

11. What is the period of time devices must wait after the medium is clear before attempting to transmit?
a. collision timeframe c. backoff interval
b. signal data rate d. synchronization period

12. What is the RTS/CTS protocol designed to reduce or prevent?
a. negative acknowledgements c. collisions
b. CRC errors d. handshakes

13. With which channel access method does the AP ask each computer if it wants to transmit?
a. point coordinated function c. CSMA/CD
b. CSMA/CA d. virtual carrier sensing

14. In active scanning, what does the client do initially to start the association process?
a. poll the access point c. send a beacon with the requested SSID
b. send a probe frame d. transmit an associate request frame

15. What is the last frame sent to successfully conclude a client’s attempt to associate using active scanning?
a. scan reply c. probe response
b. synchronize acknowledgement d. associate response

16. Which of the following is true about client’s associating with an AP?
a. an AP can reject the request based on the client MAC address c. a client can reassociate with another AP in a BSS
b. a client can be associated to multiple APs simultaneously for fault tolerance d. if a client is not preconfigured for a specific AP, it will not attempt to associate

17. Which of the following is NOT true about WLAN power management?
a. power management is transparent to applications c. the AP uses timestamps to maintain synchronization
b. 802.11b devices use power management in ad hoc mode d. the AP keeps a record of which client’s are sleeping

18. What is the list of devices called that an AP sends in a beacon that indicates which clients have buffered frames waiting?
a. sleep mode identifier c. traffic indication map
b. buffered frames allocation d. packet delivery list

19. Which of the following is a function performed by MAC management frames?
a. request-to-send c. reassociation request
b. transmit data to the client d. acknowledgement

20. What is the time period during which all devices must wait between transmissions of data frames?
a. Short Interframe Space c. Idle Requirement Period
b. DCF Interframe Space d. Transmission Control Period

COMPLETION

1. In the place of a port for a cable connection, a wireless NIC has a(n) ______________.

2. An AP acts as a(n) ____________ between the wired and wireless networks.

3. ____________________ mode consists of at least one wireless client connected to a single AP.

4. Once the _____________ has formatted the frame, it passes the frame to the PMD sublayer.

5. When a client is finishing transmitting, it begins listening for a(n) ________________ from the receiving device.

MATCHING

a. ACK f. control frames
b. active scanning g. DCF
c. associate request frame h. fragmentation
d. BSS i. management frames
e. channel access methods j. passive scanning

1. a WLAN mode that consists of at least one wireless client and one AP

2. a frame sent by a client to an AP that contains the client’s capabilities and supported rates

3. MAC frames that assist in delivering the frames that contain data

4. the process of listening to each available channel for a set period of time

5. the division of data to be transmitted from one large frame into several smaller frames

6. a procedure used to reduce collisions by requiring the receiving station to send an explicit packet back to the sending station

7. the default channel access method in IEEE 802.11 WLANs

8. MAC frames that are used, for example, to set up the initial communications between a client and the AP

9. the process of sending frames to gather information

10. the different ways of sharing resources in a network environment

SHORT ANSWER

1. What are the four steps involved in wireless NIC transmission?

2. Describe the two basic functions of an AP.

3. What is infrastructure mode? Include a discussion of BSS and ESS in your answer.

4. What is a drawback of an ESS WLAN with respect to roaming users? What is a remedy to this drawback?

5. Describe the Physical layer of the 802.11b standard.

6. List the three parts of the PLCP frame.

7. How does CSMA/CA in DCF handle media contention?

8. How does RTS/CTS work?

9. Describe the six basic rules of communication in an 802.11 network.

10. Describe the six steps that occur if two devices have frames to transmit.

Chapter 8 – High-Speed WLANs and WLAN Security

TRUE/FALSE

1. The 802.11a standard maintains the same MAC layer functions as 802.11b WLANs.

2. Increasing data transmission speed through more complex modulation schemes makes multipath distortion worse.

3. The 4-bit Rate field in an 802.11a PLCP frame specifies the speed at which the Data field will be transmitted.

4. Wireless controllers incorporate most AP functions including the radio.

5. VPNs encrypt a connection for security and use very few processing resources.

MULTIPLE CHOICE

1. Which of the following 802.11 standards uses U-NII bands and does not use ISM bands?
a. 802.11b c. 802.11g
b. 802.11a d. 802.11n

2. Which of the U-NII bands is approved for outdoor use?
a. U-NII-1 c. U-NII-2 Extended
b. U-NII-2 d. U-NII-3

3. What is the multiplexing technique used by 802.11a to help solve the multipath distortion problem?
a. QPSK c. FEC
b. OFDM d. PBCC

4. How many bits per symbol can be transmitted using 16-QAM?
a. 16 c. 4
b. 2 d. 8

5. Which wireless data rate uses 64-level quadrature amplitude modulation, transmitting over 48 subcarriers?
a. 11 Mbps c. 24 Mbps
b. 2 Mbps d. 54 Mbps

6. Which layer defines the characteristics of the wireless medium?
a. PLCP c. LLC
b. PMD d. MAC

7. Which field in an 802.11a PLCP frame are used to initialize part of the transmitter and receiver circuits?
a. Tail c. Service
b. Pad d. Parity

8. What is the disadvantage of an 802.11a WLAN compared to an 802.11b WLAN?
a. shorter range c. more interference sources
b. higher error rate d. lower bandwidth

9. How many non-overlapping channels are available in an 802.11g WLAN?
a. 23 c. 3
b. 11 d. 8

10. Why is the SIFS time in the 802.11g standard effectively extended to 16 microseconds?
a. for compatibility with 802.11a c. to allow 802.11n devices on the network
b. to account for quiet time d. to achieve data rates higher than 11 Mbps

11. Which of the following is correct about antenna diversity?
a. it is the cornerstone of the 802.11n technology c. it increases bandwidth while decreasing range
b. it is two radios and one antenna d. it is two antennas with one radio

12. What do 802.11n devices employ to direct a transmission back to the device from which a frame was received?
a. spatial multiplexing c. MIMO
b. beamforming d. antenna diversity

13. What is the maximum radio configuration for 802.11n devices?
a. 3 transmitters, 3 receivers c. 4 transmitters, 4 receivers
b. 6 transmitters, 4 receivers d. 4 transmitters, 3 receivers

14. How much bandwidth do 802.11n devices utilize when running at speeds up to 300 Mbps?
a. 20 MHz c. 40 MHz
b. 22 MHz d. 44 MHz

15. What is the purpose of a guard band?
a. help prevent adjacent channel interference c. helps prevent outside EM interference
b. help prevent co-channel interference d. helps prevent intersymbol interference

16. What 802.11n mode of operation is referred to as greenfield?
a. transmitting in non-HT mode with 802.11a/g devices c. transmitting with only HT devices
b. transmitting in mixed HT/non-HT devices d. transmitting at a faster speed than receiving

17. Which HT operation mode is used when one or more non-HT devices are associated with an HT AP and supports devices at 20 or 40 MHz?
a. Mode 0 c. Mode 2
b. Mode 1 d. Mode 3

18. Which IEEE standard supports QoS and enables prioritization of frames in DCF?
a. 802.11f c. 802.11d
b. 802.11e d. 802.11c

19. What 802.11 standard under development uses up to 160 MHz bandwidth and can achieve data rates up to 7 Gbps?
a. 802.11bg c. 802.11cd
b. 802.11ac d. 802.11ga

20. What type of device can you deploy to allow client WLAN connectivity when the main AP is out of range?
a. bridge c. monitor
b. controller d. router

COMPLETION

1. __________________ distortion occurs when the receiving device gets the same signal from several different directions at different times.

2. The _______________ interval prevents a new symbol from arriving at the receiver before the last multipath signal reaches the receiver’s antenna.

3. AP _____________________ is a security problem that takes advantage of the fact that clients authenticate with the AP but not vice versa.

4. The strength of encryption relies on keeping the __________ secret as well as its length.

5. 802.1X uses the Extensible ________________ Protocol for relaying access requests between a wireless device, the AP, and the RADIUS server.

MATCHING

a. co-channel interference f. reduced interframe space
b. CTS-to-self g. spatial multiplexing
c. guard band h. symbol
d. intersymbol interference i. TKIP
e. pre-shared key j. wireless controller

1. a 128-bit key used by WPA

2. interference between two devices configured to use the same frequency channel

3. a change in the signal, also known as a baud

4. a 2-microsecond interframe space that can be used in 802.11n networks

5. the unused frequency space between two adjacent channels

6. a security protocol used in WPA that provides per packet key-mixing

7. a coordination method used by 802.11g devices that prevents 802.11 and 802.11b devices that do not “understand” OFDM from attempting to initiate a transmission

8. a transmission technique that uses multiple radios and multiple antennas to send different parts of the same message simultaneously

9. devices that make it much easier to manage large WLANs by implementing most of the functions of an AP

10. caused when the beginning of a symbol arrives at the receiver antenna while multipath reflections from the previous symbol are still reaching the antenna

SHORT ANSWER

1. What is the U-NII frequency band and WLAN standard uses it?

2. Describe how 802.11a uses the U-NII-1, U-NII-2, and U-NII-2 extended bands.

3. What are the two mandatory and two optional transmission modes defined in the 802.11g PHY layer?

4. What are the three parts of an 802.11a PLCP frame? Describe them briefly.

5. Describe the approach that 802.11n (HT) takes to the implementation of the PHY layer.

6. What is MIMO technology? Include beamforming and spatial multiplexing in your answer.

7. What is the channel configuration of 802.11n and how does it help achieve higher data rates?

8. What is the guard interval and what does it help prevent?

9. What are wireless controllers and why are they important in WLANs?

10. What is 802.11i and what aspect of WLANs does it deal with?

CIS 513 Week 4 Assignment 2 – Strayer University NEW

CIS/513 Week 4 Assignment 2 – Strayer NEW

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://www.hwgala.com/CIS-513-Assignment-2-Strayer-NEW-CIS513A2.htm

 

Assignment 2: The Need for Wireless Standards and Protocols
Due Week 4 and worth 100 points

The networking field, to include wireless networking, defines many standards to govern network and wireless network operations. It is important to become familiar with the standards organizations and their current standards, standards that are currently being revised, and new standards being considered.

Write a four to five (4-5) page paper in which you:
1. Select one (1) national standards organization and one (1) international standards organization that impacts wireless technologies. Describe the impact that each standards organization has in wireless technologies on the planning and development of corporate networks.
2. Assess the breadth of the standards provided by each of the previously chosen organizations (national and international) and address where advancements or enhancements are needed.
3. Select one (1) formal and one (1) de facto wireless standard. Assess the relative importance of that standard and address if the standard will remain stable, if there are enhancements that are currently needed, or if the standard will soon become obsolete.
4. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 513 Week 3 Case Study 1 – Strayer University New

CIS/513 Week 3 Case Study 1 – Strayer New

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://www.hwgala.com/CIS-513-Week-3-Case-Study-1-Strayer-New-CIS513W3C.htm

 

Case Study 1: Emerging Wireless Technology in the Healthcare Industry

The medical industry is a good example of an industry that must balance the security issues associated with wireless technologies with the business value added from wireless technologies.

Read the Information Week article about emerging wireless medical technologies titled, “Emerging Wireless Medical Technology Gets FCC Blessing” located at http://www.informationweek.com/healthcare/mobile-wireless/emerging-wireless-medical-technology-get/240000836.

Read the Information Week article about how wireless and mobile devices will change the healthcare practices titled, “Strategy: How Mobility, Apps and BYOD Will Transform Healthcare” located in the online course shell.

Write a four to five (4-5) page paper in which you:
1. Summarize the current and emerging wireless medical technologies.
2. Describe the wireless components needed for added business value in the healthcare environment.
3. Assess the additional staffing and support requirements needed to support the wireless technologies.
4. Analyze the potential technical and regulatory problems with implementing a wireless network in a healthcare organization and describe the mitigation methods to overcome these potential problems in the healthcare industry.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 513 Complete Exams – Strayer University New

CIS/513 Exams Solution Perfect Score

Follow the link below to purchase Exam Solutions

http://www.hwmojo.com/products/cis-513-exams

We can help with many Strayer classes. Email us if you need help with your exams, quizzes, homework problems, written assignments and discussion questions. Support@hwmojo.com

Chapter 1: Introduction to Wireless Communications

TRUE/FALSE

1. In addition to digital data, user data may include e-mail messages, spreadsheets, and telephone voice messages.

ANS: PTS: 1 REF: 2

2. UWB technology is capable of doing everything that Bluetooth can, but it can handle a lot more data at higher speeds.

ANS: PTS: 1 REF: 5

3. 3G (third generation) technology uses only 50% digital transmission for both voice and data.

ANS: PTS: 1 REF: 8

4. T1 lines transmit at 5.44 Mbps.

ANS: PTS: 1 REF: 12

5. Using cellular phone technologies, companies can create a Wireless Wide Area Network (WWAN).

ANS: PTS: 1 REF: 14

MULTIPLE CHOICE

1. The term ____ is often used to describe all types of devices and technologies that are not connected by a wire.
a. ring c. cable
b. wired d. wireless

ANS: PTS: 1 REF: 2

2. ____ telephones carry digitized voice over the Internet.
a. Voice over Internet Protocol (VoIP) c. Analog
b. Bluetooth d. PDA

ANS: PTS: 1 REF: 2

3. ____ tags are small chips containing radio transponders that can be used to track inventory.
a. USB c. LAN
b. RFID d. WWAN

ANS: PTS: 1 REF: 4

4. Bluetooth and ____ are wireless standards designed for very short ranges—typically only a few inches or feet.
a. Wireless WAN (WWAN) c. Ultra Wide Band (UWB)
b. Wireless MAN (WMAN) d. Wireless LAN (WLAN)

ANS: PTS: 1 REF: 4

5. A ____ consists of two or more Bluetooth devices that are exchanging data with each other.
a. WMAN c. WWAN
b. piconet d. WUAN

ANS: PTS: 1 REF: 5

6. 3G sends data at rates of up to ____ Mbps when stationary.
a. 2 c. 4
b. 3 d. 5

ANS: PTS: 1 REF: 8

7. A ____ is an extension of a wired LAN, connecting to it through a device called a wireless access point.
a. piconet c. WLAN
b. Satellite network d. cellular network

ANS: PTS: 1 REF: 9

8. In a WLAN, the ____ relays data signals between all of the devices in the network, including file servers, printers, and even other access points (and the wireless devices connected to them).
a. WNIC c. Smartphone
b. PDA d. access point (AP)

ANS: PTS: 1 REF: 9

9. Each computer on the WLAN has a ____. This card performs the same basic functions and looks similar to a traditional NIC except that it does not have a cable that connects it to a network jack in the wall.
a. J2ME card c. PDA card
b. BREW card d. wireless network interface card

ANS: PTS: 1 REF: 9

10. Depending on the standard used,WLANs can transmit at speeds anywhere from 11 Mbps up to 54 Mbps and at distances of up to ____ feet.
a. 110 c. 375
b. 123 d. 457

ANS: PTS: 1 REF: 10

11. Integrated Services Digital Networks (ISDN) lines transmit at ____ Kbps over regular phone lines.
a. 32 c. 128
b. 64 d. 256

ANS: PTS: 1 REF: 12

12. The maximum transmission speed that can be achieved with cable modem and DSL is only about ____ Mbps.
a. 2 c. 8
b. 4 d. 16

ANS: PTS: 1 REF: 12

13. IEEE 802.16 wireless devices can be as far as ____ away.
a. 10 miles (16 kilometers) c. 70 miles (112 kilometers)
b. 35 miles (56 kilometers) d. 105 miles (168 kilometers)

ANS: PTS: 1 REF: 12

14. A ____ is a miniaturized version of a Web browser program that is based on version 2.0 of the Wireless Application Protocol (WAP).
a. microbrowser c. Java browser
b. full-fledge browser d. BREW browser

ANS: PTS: 1 REF: 13

15. ____ provides a standard way to transmit, format, and display Internet data for small wireless devices such as cell phones.
a. Bluetooth c. WMAN
b. WAP2 d. IEEE 802.16

ANS: PTS: 1 REF: 13

16. When a Web server sends a Web page back to a PC, it is sending ____ code and any files (such as graphics) required to assemble the page.
a. HTML c. J2ME
b. WAP2 d. BREW

ANS: PTS: 1 REF: 14

17. Two competing software programming languages—BREW (Binary Run-Time Environment for Wireless) and ____—are designed and optimized to display text, graphics, and even animations on the small screen of a cellular phone.
a. WWAN c. HTML
b. WAP2 d. J2ME (Java 2 Micro Edition)

ANS: PTS: 1 REF: 14

18. SWAP devices could be as far as 150 feet (45 meters) apart and could send and receive data up to ____ Mbps.
a. 2 c. 6
b. 4 d. 10

ANS: PTS: 1 REF: 15

19. A ____ is a 1.5-pound device that allows military personnel in the field to communicate through a variety of methods using wireless technologies.
a. Universal Handset c. WLAN laptop
b. notebook d. Bluetooth notebook

ANS: PTS: 1 REF: 21

20. ____ transmission of over 150 music and talk stations solves the problem of losing a station outside of its transmission range.
a. PDA radio c. Smartphone radio
b. Satellite radio d. Universal radio

ANS: PTS: 1 REF: 22

21. In industrial control, remote sensors called ____ can connect to a WLAN, then collect data and transmit it to a central location.
a. PDAs c. motes
b. Smartphones d. Universal Handsets

ANS: PTS: 1 REF: 25

COMPLETION

1. _________________________ is defined as the transmission of user data without the use of wires.

ANS: Wireless communications

PTS: 1 REF: 2

2. Both Bluetooth and UWB communicate using small, low-power transceivers called ____________________ built onto tiny microprocessor chips.

ANS: radio modules

PTS: 1 REF: 4

3. In satellite communications, a device called a(n) ____________________ is located in the satellite itself that simply “repeats” the same signal to another location.

ANS: repeater

PTS: 1 REF: 6

4. _____________________________________________ are based on the IEEE 802.16 Fixed Broadband Wireless standard and use wireless transmissions for data communications.

ANS:
WMANs
wireless metropolitan area networks (WMANs)
wireless metropolitan area networks

PTS: 1 REF: 12

5. SWAP was established by the ____________________, which was made up of over 50 different companies from the personal computer, consumer electronics, communications, and software industries.

ANS: HomeRF Working Group

PTS: 1 REF: 15

MATCHING

Match each item with an statement below.
a. Smartphone f. Shared Wireless Access Protocol (SWAP)
b. Personal digital assistant (PDA) g. Warehouse management system (WMS)
c. Link manager h. Wireless Application Protocol (WAP)
d. A piconet i. IEEE
e. Hypertext Markup Language (HTML)

1. also called a wireless personal area network (WPAN).

2. software that helps identify other Bluetooth devices, creates a link between them, and sends and receives data.

3. combination mobile phone and personal digital assistant (PDA).

4. establishes networking standards for WLANs

5. used in warehouses to manage all of the activities from receiving through shipping.

6. small handheld device used for keeping an appointment calendar, to-do list, phone book, and notepad.

7. standard language for displaying content from the Internet.

8. defines a set of specifications for wireless data and voice communications around the home.

9. allowed Web browsing from cellular phones using text only, and it required a gateway server between the Web server and the cellular phone.

SHORT ANSWER

1. Use an example to compare Bluetooth and Ultra Wide Band (UWB) technologies.

ANS:

2. Briefly describe a cellular network.

ANS:

3. What is Wireless Application Protocol version 2.0 (WAP2)?

ANS:

4. What is digital convergence?

ANS:

5. What are some of the benefits of using wireless communications for home entertainment?

ANS:

6. Explain how wireless technologies can solve the problem of administering medication in a hospital setting.

ANS:

7. Mention some of the benefits of using wireless solutions in the construction industry.

ANS:

8. Describe the benefits of using wireless technologies when doing environmental research.

ANS:

9. Mention some of the benefits of wireless communications in the industrial control.

ANS:

10. Briefly explain why wireless communications offer increased reliability.

ANS:

Chapter 2: Wireless Data Transmission

TRUE/FALSE

1. Digital data for wireless communications is represented in the same way as standard computer data, using the two binary digits 0 and 1.

ANS: PTS: 1 REF: 38

2. Infrared wireless systems send data by the intensity of the light wave instead of on-off signals of light.

ANS: PTS: 1 REF: 42

3. Infrared light provide the most common and effective means of wireless communications today.

ANS: PTS: 1 REF: 46

4. The height of a carrier wave is known as the frequency and can be measured in volts (electrical pressure).

ANS: PTS: 1 REF: 55

5. Frequency modulation (FM) is more susceptible than AM to interference from outside sources.

ANS: PTS: 1 REF: 57

MULTIPLE CHOICE

1. In a binary number system, the digits 0 and 1 are known as ____.
a. bytes c. tribits
b. dibits d. bits

ANS: PTS: 1 REF: 39

2. There are two basic types of waves by which wireless data are sent and received: ____ light and radio waves.
a. infrared c. X-Rays
b. ultraviolet d. Gamma Rays

ANS: PTS: 1 REF: 41

3. In an infrared wireless system, a(n) ____ is usually a laser diode or a light emitting diode (LED).
a. receiver c. emitter
b. antenna d. transceiver

ANS: PTS: 1 REF: 42

4. An infrared ____ transmission requires that the emitter and detector be directly aimed at one another.
a. diffused c. antenna-based
b. directed d. modem-based

ANS: PTS: 1 REF: 43

5. An infrared ____ transmission relies on reflected light.
a. diffused c. antenna-based
b. directed d. modem-based

ANS: PTS: 1 REF: 43

6. Diffused infrared can send data at only up to ____ Mbps.
a. 2 c. 6
b. 4 d. 8

ANS: PTS: 1 REF: 45

7. A(n) ____ signal is one in which the intensity (voltage or amplitude) varies and is broadcast continuously, in other words, the signal has no breaks in it.
a. NZR c. analog
b. digital d. binary

ANS: PTS: 1 REF: 48

8. A(n) ____ signal consists of discrete or separate pulses.
a. NZR c. analog
b. continuous d. digital

ANS: PTS: 1 REF: 48

9. A ____ converts the distinct digital signals from a computer and encodes them into a continuous analog signal for transmission over analog phone lines.
a. router c. modem
b. firewall d. hub

ANS: PTS: 1 REF: 49

10. The number of times a cycle occurs within one second equals the ____ of a wave.
a. amplitude c. phase
b. frequency d. height

ANS: PTS: 1 REF: 50

11. A(n) ____ is a continuous wave (CW) of constant amplitude (also called voltage) and frequency.
a. cycle c. phase
b. peak d. carrier signal

ANS: PTS: 1 REF: 50

12. A(n) ____ is a length of copper wire, or similar material, with one end free and the other end connected to a receiver or transmitter.
a. antenna c. amplitude
b. Hertz d. LED

ANS: PTS: 1 REF: 52

13. A ____ is a change in the signal, and every time the signal changes, in amplitude, frequency, phase, or a combination of these, it defines the boundary of a signal unit.
a. bits per second c. hertz
b. baud d. wave

ANS: PTS: 1 REF: 53

14. When a signal unit can represent three bits, it is called a ____.
a. byte c. tribit
b. dibit d. quadbit

ANS: PTS: 1 REF: 54

15. ____ modulation is the representation of analog information by an analog signal.
a. Digital c. Frequency
b. Phase d. Analog

ANS: PTS: 1 REF: 55

16. In ____, the height of the carrier wave is changed in accordance with the height of another analog signal, called the modulating signal.
a. amplitude modulation (AM) c. phase modulation (PM)
b. frequency modulation (FM) d. phase shift key (PSK)

ANS: PTS: 1 REF: 55

17. In ____ the number of waves that occur in one second change based on the amplitude of the modulating signal, while the amplitude and phase of the carrier remain constant.
a. amplitude modulation (AM) c. phase modulation (PM)
b. binary modulation (BM) d. frequency modulation (FM)

ANS: PTS: 1 REF: 57

18. ____ modulation is the method of encoding a digital signal onto an analog wave for transmission over a medium that does not support digital signals.
a. Digital c. Continuous
b. Analog d. Wave

ANS: PTS: 1 REF: 59

19. With ____, the voltage signal remains positive, or high, for the entire length of the bit period.
a. return-to-zero c. polar non-return-to-zero
b. non-return-to-zero d. non-return-to-zero, invert-on-ones

ANS: PTS: 1 REF: 60

20. ____ transmissions means that each signal transmits on one radio frequency or a very narrow range of frequencies.
a. Frequency hopping spread spectrum c. Narrow-band
b. Spread spectrum d. Direct sequence spread spectrum

ANS: PTS: 1 REF: 67

21. A ____ code (or chipping code) is a particular sequence of 1s and 0s that has properties that make it ideal for modulating radio waves, as well as for being detected correctly by the receiver.
a. Barker c. FHSS
b. CDMA d. PSK

ANS: PTS: 1 REF: 71

COMPLETION

1. All the different types of light that travel from the Sun to the Earth make up the ____________________.

ANS: light spectrum

PTS: 1 REF: 42

2. Infrared wireless systems require that each device have two components: an emitter that transmits a signal, and a(n) ____________________ that receives the signal.

ANS:etector

PTS: 1 REF: 42

3. The process of encoding the digital signals (bits) onto an analog wave is called ____________________.

ANS: modulation

PTS: 1 REF: 49

4. The speed of transmission is usually shown in ____________________, since the primary concern is how efficiently the data can be moved from one place to another.

ANS:
bits per second (bps)
bits per second
bps

PTS: 1 REF: 53

5. Strictly speaking, in analog systems, ____________________ is defined as the range of frequencies that can be transmitted by a particular system or medium.

ANS:andwidth

PTS: 1 REF: 54

MATCHING

Match each item with an statement below:
a. ASCII code f. A dibit
b. Infrared light g. The return-to-zero (RZ) technique
c. Radio (radiotelephony) wave h. Amplitude shift keying (ASK)
d. The carrier signal wave i. Frequency shift keying (FSK)
e. Baud rate

1. an up-and-down wave called an oscillating signal or a sine wave.

2. adjacent to visible light on the light spectrum but is a much better medium for data transmission.

3. calls for the signal to rise (voltage to increase) to represent a 1 bit.

4. binary modulation technique similar to amplitude modulation, in that the height of the carrier signal can be changed to represent a 1 bit or a 0 bit.

5. type of electromagnetic wave.

6. binary modulation technique that changes the frequency of the carrier signal.

7. signal unit that represents two bits.

8. scheme that uses the numbers from 0 to 255 to represent letters of the alphabet or symbols like a dollar sign.

9. number of signal units per second that are required to represent the bits transmitted.

SHORT ANSWER

1. Briefly explain how to represent a number in Base 10.

ANS:

2. How can you transmit information using light?

ANS:

3. What are the limitations to infrared wireless systems?

ANS:

4. How are frequencies measured?

ANS:

5. How are radio waves transmitted and received using an antenna?

ANS:

6. Explain the differences between the terms bps and baud rate.

ANS:

7. Briefly explain phase modulation (PM).

ANS:

8. What are the four primary advantages of digital modulation?

ANS:

9. What is phase shift keying (PSK)? How does it work?

ANS:

10. What are three of the most important characteristics of direct sequence spread spectrum (DSSS)?

ANS:

Chapter 3: Understanding Radio Frequency Communications

TRUE/FALSE

1. A bandpass filter sets a range called a passband, which includes both a minimum and a maximum threshold. Signals that fall within the passband are allowed through the bandpass filter.

ANS: PTS: 1 REF: 85

2. With FDMA, all of the transmissions are taking place at the same frequency, but one at a time.

ANS: PTS: 1 REF: 91

3. Code Division Multiple Access (CDMA) is used primarily for cellular telephone communications.

ANS: PTS: 1 REF: 92

4. Circuit switching is ideal for transmitting data.

ANS: PTS: 1 REF: 98

5. Multipath distortion does not affect FM radio stations.

ANS: PTS: 1 REF: 104

MULTIPLE CHOICE

1. A(n) ____ removes all the RF signals that are not wanted.
a. antenna c. filter
b. mixer d. amplifier

ANS: PTS: 1 REF: 84

2. A ____ filter sets a minimum frequency threshold level. All signals that are above the minimum threshold are allowed to pass through, while those below the minimum threshold are blocked.
a. low-pass c. bandpass
b. high-pass d. mixer

ANS: PTS: 1 REF: 85

3. The purpose of a(n) ____ is to combine two radio frequency inputs to create a single output.
a. mixer c. filter
b. antenna d. amplifier

ANS: PTS: 1 REF: 86

4. The ____ essentially increases the amplitude of an RF signal.
a. antenna c. filter
b. mixer d. amplifier

ANS: PTS: 1 REF: 88

5. ____ transmissions allow data to flow in both directions simultaneously.
a. Line-of-sight c. Half-Duplex
b. Simplex d. Full-Duplex

ANS: PTS: 1 REF: 96

6. ____ transmission occurs in only one direction, from device 1 to device 2.
a. Line-of-sight c. Half-Duplex
b. Simplex d. Full-Duplex

ANS: PTS: 1 REF: 95

7. ____ transmission sends data in both directions, but only one way at a time.
a. Line-of-sight c. Half-Duplex
b. Simplex d. Full-Duplex

ANS: PTS: 1 REF: 95

8. ____ divides the transmission time into several slots.Each user is assigned the entire frequency for the transmission for a fraction of time on a fixed, rotating basis.
a. TDMA c. CDMA
b. FDMA d. CSMA

ANS: PTS: 1 REF: 91

9. ____ involves moving the signal from one wire or frequency to another.
a. Repeating c. Switching
b. Amplifying d. Mixing

ANS: PTS: 1 REF: 96

10. Instead of using circuit switching, data networks use ____ switching.
a. packet c. byte
b. bit d. CDMA

ANS: PTS: 1 REF: 98

11. ____ compares the signal strength with the background noise.
a. CDMA c. FDMA
b. TDMA d. SNR

ANS: PTS: 1 REF: 100

12. A(n) ____ antenna radiates the electromagnetic waves in one direction only and can help reduce or eliminate the effect of multipath distortion if there is a clear line of sight between the two antennas.
a. omnidirectional c. circular
b. directional d. all-around

ANS: PTS: 1 REF: 103

13. The world’s first telecommunications standard was published by the ____ in 1885.
a. International Telegraph Union (ITU)
b. American National Standards Institute (ANSI)
c. Electronic Industries Alliance (EIA)
d. Internet Engineering Task Force (IETF)

ANS: PTS: 1 REF: 104

14. ____ standards are those that are controlled by an organization or body that has been entrusted with that task.
a. De facto c. Consortia
b. De jure d. Industrial

ANS: PTS: 1 REF: 107

15. The ____ functions largely as a clearinghouse for all kinds of standards development in the United States.
a. Electronic Industries Alliance (EIA)
b. Telecommunications Industries Association (TIA)
c. Internet Engineering Task Force (IETF)
d. American National Standards Institute (ANSI)

ANS: PTS: 1 REF: 108

16. The ____ is responsible for defining the overall architecture of the Internet and also serves as the technology advisory group to the Internet Society (ISOC).
a. Electronic Industries Alliance (EIA)
b. Telecommunications Industries Association (TIA)
c. Internet Architecture Board (IAB)
d. American National Standards Institute (ANSI)

ANS: PTS: 1 REF: 108

17. The ____ develops telecommunications standards for use throughout Europe.
a. International Telecommunications Union (ITU)
b. Institute of Electrical and Electronics Engineers (IEEE)
c. Internet Society (ISOC)
d. European Telecommunications Standards Institute (ETSI)

ANS: PTS: 1 REF: 109

18. The ____ is an agency of the United Nations that is responsible for telecommunications.
a. International Telecommunications Union (ITU)
b. Institute of Electrical and Electronics Engineers (IEEE)
c. Internet Society (ISOC)
d. European Telecommunications Standards Institute (ETSI)

ANS: PTS: 1 REF: 109

19. In the United States, the ____ serves as the primary regulatory agency for telecommunications.
a. American National Standards Institute (ANSI)
b. Electronic Industries Association (EIA)
c. Federal Communications Commission (FCC)
d. International Telecommunications Union (ITU)

ANS: PTS: 1 REF: 110

20. The ____ is the entire range of all radio frequencies that exist.
a. dial band c. ultraviolet spectrum
b. radio frequency spectrum d. light spectrum

ANS: PTS: 1 REF: 111

21. The radio frequency spectrum is divided into 450 different sections, or ____.
a. bands c. amplitudes
b. waves d. heights

ANS: PTS: 1 REF: 111

COMPLETION

1. With a(n) ____________________ filter, a maximum frequency threshold is set and all signals below that value are allowed to pass through.

ANS: low-pass

PTS: 1 REF: 84

2. _____________________________________________ divides the bandwidth of a channel (a range of frequencies) into several smaller frequencies bands.

ANS:
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access
FDMA

PTS: 1 REF: 90

3. Telephone systems use a type of switching known as ____________________.

ANS:ircuit switching

PTS: 1 REF: 98

4. Packet switching requires that the data transmission be broken into small units called ____________________.

ANS: packets

PTS: 1 REF: 98

5. The function of the __________________________________________________ is to advocate policy issues to legislative bodies and to establish standards in five areas: user premises equipment, network equipment, wireless communications, fiber optics, and satellite communications.

ANS:
Telecommunications Industries Association (TIA)
Telecommunications Industries Association
TIA

PTS: 1 REF: 108

MATCHING

Match each item with an statement below:
a. Radio frequency (RF) communications f. EIA
b. Mixer g. IETF
c. Attenuation h. ISO
d. De jure standard i. Unregulated bands
e. Consortia

1. also called official standard.

2. most common type of wireless communications.

3. usually industry-sponsored organizations that have the goal of promoting a specific technology.

4. made up of industry vendors from four areas: electronic components, consumer electronics, electronic information, and telecommunications.

5. promotes international cooperation and standards in the areas of science, technology, and economics.

6. radio spectra that are available nationwide without charge to any users without a license.

7. loss of signal strength.

8. protocol engineering and development arm of the Internet.

9. converts an input frequency to a specific desired output frequency.

SHORT ANSWER

1. Explain the use of filters in transmitters.

ANS:

2. What are the advantages of TDMA over FDMA?

ANS:

3. How does Code Division Multiple Access (CDMA) work?

ANS:

4. Briefly explain switching on a telephone system.

ANS:

5. What are the advantages of packet switching over circuit switching?

ANS:

6. Explain the multipath distortion phenomenon.

ANS:

7. Explain the need for standards for telecommunications.

ANS:

8. What are De facto standards?

ANS:

9. Explain the process of creating a de jure standard.

ANS:

10. What is the role of the FCC in wireless communications?

ANS:

Chapter 4: How Antennas Work

TRUE/FALSE

1. Signal power does not usually change in linear fashion. Instead, it changes logarithmically.

ANS: PTS: 1 REF: 125

2. It is not possible to build a real isotropic radiator since it would need a power or signal cable connected to it at some point on the surface of the sphere.

ANS: PTS: 1 REF: 127

3. The size of an antenna is directly proportional to the wavelength of the signal it is designed to transmit or receive.

ANS: PTS: 1 REF: 129

4. The distance between the transmitter and receiver determines the strength of the signal you need to send.

ANS: PTS: 1 REF: 133

5. Equal polarization between devices can cause poor communication between them.

ANS: PTS: 1 REF: 137

MULTIPLE CHOICE

1. An amplifier boosts the power of a signal; when this happens, the effect is called a(n) ____.
a. decibel c. gain
b. isotropic d. loss

ANS: PTS: 1 REF: 125

2. Cables and connectors offer a resistance to the flow of electricity and therefore they tend to decrease the power of a signal. This decrease is called a(n) ____.
a. intensity c. decibel
b. loss d. gain

ANS: PTS: 1 REF: 125

3. ____ is a relative way to indicate an absolute power level in the linear Watt scale.
a. dBm c. Mb
b. Hz d. MdB

ANS: PTS: 1 REF: 126

4. A(n) ____ is a theoretical perfect sphere that radiates power equally in all directions.
a. directional antenna c. passive antenna
b. omnidirectional antenna d. isotropic radiator

ANS: PTS: 1 REF: 127

5. The gain of antennas is usually expressed in ____.
a. dB c. Hz
b. dB isotropic (dBi) d. Mb

ANS: PTS: 1 REF: 128

6. For microwave and higher frequency antennas, the gain is usually expressed in ____.
a. decibel (dB) c. dB dipole (dBd)
b. dB isotropic (dBi) d. hertz (Hz)

ANS: PTS: 1 REF: 128

7. ____ antennas are the most common type and are constructed of a piece of metal, wire, or similar conductive material.
a. Active c. Dish
b. Patch d. Passive

ANS: PTS: 1 REF: 129

8. ____ antennas are used to transmit and receive signals from all directions with relatively equal intensity.
a. Omnidirectional c. Line-of-sight
b. Directional d. LOS

ANS: PTS: 1 REF: 129

9. In ____, RF waves tend to spread away from the source of the signal (the antenna).
a. patch antennas c. wavelength
b. omnidirectional antennas d. free space loss

ANS: PTS: 1 REF: 133

10. The length of a single RF sine wave, or the ____, is what determines the size of an antenna.
a. free space loss c. wavelength
b. gain d. loss

ANS: PTS: 1 REF: 134

11. The ____ indicates the direction, width, and shape of the RF signal beam coming from the antenna.
a. antenna pattern c. frequency
b. wavelength d. decibels

ANS: PTS: 1 REF: 135

12. The orientation of the wave leaving the antenna is called ____.
a. amplitude c. antenna pattern
b. antenna polarization d. wavelength

ANS: PTS: 1 REF: 137

13. ____ antennas are basically a length of wire or metal.
a. Two-dimensional c. One-dimensional
b. Satellite dish d. Patch

ANS: PTS: 1 REF: 138

14. Antennas organized in a two-dimensional pattern, with both height and width, are known as ____ antennas.
a. one-dimensional c. dish
b. patch d. two-dimensional

ANS: PTS: 1 REF: 139

15. A(n) ____ antenna resembles a large horn with the wide end bent to one side.
a. patch c. one-dimensional
b. horn d. ground-plane

ANS: PTS: 1 REF: 139

16. ____ antennas “know” where the mobile receiver is, and can track it and focus the RF energy in that particular direction to avoid wasting energy and to prevent interference with other antennas.
a. Smart c. Horn
b. Patch d. Two-dimensional

ANS: PTS: 1 REF: 140

17. Most antennas are connected to the transmitter or receiver using ____ cable.
a. fiber optic c. copper
b. coaxial d. UTP

ANS: PTS: 1 REF: 143

18. Impedance is measured in ____.
a. watts c. ohms
b. db d. hertz

ANS: PTS: 1 REF: 143

19. ____ is the combination of resistance, inductance, and capacitance of the circuit.
a. Impedance c. Gain
b. Wavelength d. Loss

ANS: PTS: 1 REF: 143

20. In most wireless communications applications, one transmitter communicates with several mobile clients. This is called a ____ wireless link.
a. point-to-point c. line-of-sight
b. dish d. point-to-multipoint

ANS: PTS: 1 REF: 145

21. The space between two antennas would be more accurately represented by something similar to an ellipse. This elliptical region is called the ____.
a. Fresnel zone c. gain
b. wavelength d. isotropic zone

ANS: PTS: 1 REF: 146

COMPLETION

1. ____________________ is a ratio between two signal levels (a relative measurement) that makes it much simpler to express and calculate power gain or loss.

ANS:
Decibel (dB)
Decibel
dB

PTS: 1 REF: 125

2. ____________________ is the measurement of the gain that any antenna has when compared to the theoretical isotropic radiator.

ANS:
dB isotropic (dBi)
dB isotropic
dBi

PTS: 1 REF: 128

3. ____________________ antennas emit an RF energy beam that is horizontally wide but vertically taller than that of a yagi antenna.

ANS: Patch

PTS: 1 REF: 132

4. An antenna transmits and receives a signal most efficiently at a specific frequency when it is as long as the full length of the wave,which is called a(n) ____________________ antenna.

ANS:ull-wave

PTS: 1 REF: 134

5. Monopoles can be equipped with a large metal base called a(n) ____________________, to simulate the signal-reflecting effect of the ground.

ANS: ground-plane

PTS: 1 REF: 139

MATCHING

Match each term with the correct statement below:
a. Both gain and loss f. Phased array antennas
b. A dipole g. Impedance
c. Active antennas h. A spectrum analyzer
d. Directional antennas i. ISM and U-NII bands
e. A monopole antenna

1. are examples of unlicensed frequencies.

2. is a tool that displays the signal amplitude and frequency and can also detect interference in a particular frequency or channel.

3. are used extensively in ultra-modern radar systems.

4. is basically a straight piece of wire or metal, usually a quarter of the wavelength, with no reflecting or ground element.

5. is the smallest, simplest, most practical type of antenna that can be made, but that also exhibits the least amount of gain.

6. are essentially passive antennas with an amplifier built-in.

7. is the opposition to the flow of alternating current in a circuit.

8. are relative concepts,which means that you need to know the power level of the signal at two different points.

9. are used when you need to transmit a signal in one direction only.

SHORT ANSWER

1. What are the tens and threes rules of RF mathematics?

ANS:

2. What are the main characteristics of passive antennas?

ANS:

3. What are the characteristics that determine the size and shape of an antenna?

ANS:

4. Use an example to describe the free space loss effect.

ANS:

5. Explain the differences between vertical and horizontal polarization.

ANS:

6. Compare a monopole antenna with a dipole antenna.

ANS:

7. What are the two classes of smart antennas?

ANS:

8. What are the main characteristics of a point-to-point link?

ANS:

9. Briefly describe link budgets.

ANS:

10. What are some of the basic tools needed to align an antenna?

ANS:

Chapter 5: Low Rate Wireless Personal Area Networks

TRUE/FALSE

1. Although the OSI model is most often associated with local area networks, it actually is used for all types of data communications.

ANS: PTS: 1 REF: 159

2. SIR uses a clock that is 32 times faster than the data rate.

ANS: PTS: 1 REF: 161

3. Bluetooth uses the same frequency as IEEE 802.11b WLANs.

ANS: PTS: 1 REF: 169

4. In a ZigBee network, child devices can connect to other child devices.

ANS: PTS: 1 REF: 176

5. ZigBee devices are engineered to automatically associate with and join the network.

ANS: PTS: 1 REF: 180

MULTIPLE CHOICE

1. The ____ layer is responsible for establishing and maintaining connectivity to the local network.
a. Physical (PHY) c. Logical Link Control (LLC)
b. Data Link d. Transport

ANS: PTS: 1 REF: 159

2. The ____ is responsible for hardware addressing and error detection and correction.
a. Data Link c. frame link
b. Media Access Control (MAC) d. Logical Link Control (LLC)

ANS: PTS: 1 REF: 159

3. The most common infrared connection today is based on the ____ specifications.
a. Bluetooth c. IEEE 802.15.4
b. ZigBee d. IrDA

ANS: PTS: 1 REF: 160

4. FIR uses a modulation scheme called ____ in which information is conveyed by the position of a pulse within a time slot.
a. 4-PPM c. PSK
b. BSK d. FSK

ANS: PTS: 1 REF: 162

5. The Bluetooth ____ layer defines how the basic hardware that controls the radio transmissions functions.
a. Radio module c. Link manager
b. Baseband d. RF

ANS: PTS: 1 REF: 165

6. At the heart of the Bluetooth RF layer is a single radio transmitter/receiver (transceiver). This single tiny chip is called a Bluetooth ____.
a. baseband c. radio module
b. link manager d. L2CAP

ANS: PTS: 1 REF: 165

7. The Bluetooth ____ layer manages physical channels and links, handles packets, and does paging and inquiry to locate other Bluetooth devices in the area.
a. Baseband c. Radio module
b. Link manager d. L2CAP

ANS: PTS: 1 REF: 167

8. Bluetooth divides the 2.4 GHz frequency into 79 different frequencies, called ____, spaced 1 MHz apart.
a. waves c. amplitudes
b. heights d. channels

ANS: PTS: 1 REF: 168

9. Bluetooth version 1.2 adds a feature called ____ that further improves compatibility with 802.11b.
a. frequency shift keying (FSK)
b. two-level Gaussian frequency shift keying (2-GFSK)
c. adaptive frequency hopping (AFH)
d. modulation index

ANS: PTS: 1 REF: 169

10. A(n) ____ link is a symmetric point-to-point link between a master and a single slave in the piconet.
a. asynchronous connectionless (ACL)
b. access control list (ACL)
c. Forward Error Correction (FEC)
d. synchronous connection-oriented (SCO)

ANS: PTS: 1 REF: 172

11. ____ uses two carrier waves that are exactly 90 degrees out of phase and therefore do not interfere with each other.
a. Frequency shift keying (FSK)
b. Offset quadrature phase shift keying (O-QPSK)
c. Binary phase shift keying (BPSK)
d. Amplitude shift keying (ASK)

ANS: PTS: 1 REF: 178

12. The ____ layer in 802.15.4 handles all access from the upper layers to the physical radio channel.
a. MAC c. GTS
b. LLC d. DLC

ANS: PTS: 1 REF: 179

13. ____ are reserved periods for critical devices to transmit priority data between two beacons.
a. Superframes c. Scatternets
b. Guaranteed time slots (GTS) d. Piconets

ANS: PTS: 1 REF: 179

14. A ____ signals the beginning of a superframe and contains information about the type and number of time slots contained in the superframe.
a. piconet c. beacon
b. scatternet d. GTS

ANS: PTS: 1 REF: 179-180

15. In a ZigBee network, devices query other devices to identify the location and number of devices that are connected to the network in a process called ____.
a. device discovery c. access point location
b. service discovery d. server location

ANS: PTS: 1 REF: 180

16. There are three basic topologies for ZigBee networks—star, tree, and ____.
a. bus c. token ring
b. ring d. mesh

ANS: PTS: 1 REF: 182

17. A ____ is a unique security code, or key, provided by a certificate authority.
a. public key infrastructure (PKI) c. symmetric key
b. certificate authority d. DSSS

ANS: PTS: 1 REF: 185

18. A ____ is a private company that verifies the authenticity of each user to avoid the possibility of fraud.
a. public key infrastructure (PKI) c. symmetric key
b. certificate authority d. DSSS

ANS: PTS: 1 REF: 185

19. ____ in a Bluetooth piconet is based on identifying the device itself, and not who is using the device.
a. Encryption c. Availability
b. Confidentiality d. Authentication

ANS: PTS: 1 REF: 185

20. ____ is the process of encoding communications and ensures that the transmissions cannot be easily intercepted and decoded.
a. Identification c. Encryption
b. Authorization d. Authentication

ANS: PTS: 1 REF: 186

21. Frame integrity is a technique that uses a(n) ____, a sequence of bits based on a subset of the data itself, the length field, and the symmetric key.
a. access control list (ACL) c. certificate authority
b. public key infrastructure (PKI) d. message integrity code (MIC)

ANS: PTS: 1 REF: 186

COMPLETION

1. A(n) ____________________ is a group of technologies that are designed for short-range communications, effectively eliminating the need for wires or cables to interconnect multiple devices.

ANS:
wireless personal area network (WPAN)
wireless personal area network
WPAN

PTS: 1 REF: 158

2. ____________________ is a microchip that is used to control a computer’s serial interface port.

ANS:
UART (Universal Asynchronous Receiver/Transmitter)
UART
Universal Asynchronous Receiver/Transmitter

PTS: 1 REF: 161

3. The variation of FSK used by Bluetooth is known as ____________________.

ANS:
two-level Gaussian frequency shift keying (2-GFSK)
two-level Gaussian frequency shift keying
2-GFSK

PTS: 1 REF: 167

4. A connection between Bluetooth devices is normally a two-step process. The first step is known as the ____________________.

ANS: inquiry procedure

PTS: 1 REF: 171

5. A(n) ____________________ link is a packet-switched link that is used for data transmissions.

ANS:
asynchronous connectionless (ACL)
asynchronous connectionless
ACL

PTS: 1 REF: 172

MATCHING

Match each term with the correct statement below:
a. The physical layer (PHY) f. Scatternet
b. The Data Link layer g. The ZigBee Alliance
c. A frame h. The superframe
d. Bluetooth i. Cluster tree topologies
e. Piconet

1. responsible for the transfer of data between nodes in the same network segment and that also provides error detection.

2. responsible for converting the data bits into an electromagnetic signal and transmitting it on the medium.

3. Bluetooth network that contains one master and at least one slave and that uses the same channel.

4. group of piconets in which connections exist between different piconets.

5. data link layer packet that contains the header and trailer required by the physical medium.

6. mechanism for managing transmission time in a piconet.

7. made up of two or more tree topology networks that are interconnected by full-function devices.

8. industry specification that defines small-form-factor, low-cost wireless radio communications.

9. formed in 2002 to create a set of specifications for low-power, cost-effective, wirelessly networked products for monitoring and control.

SHORT ANSWER

1. List various current and future applications for WPAN technology.

ANS:

2. What is the common set of characteristics of IrDA devices?

ANS:

3. What are some of the other protocols supported by the IrDA protocol stack?

ANS:

4. What is the transmission speed supported by Bluetooth?

ANS:

5. Explain the two-step Bluetooth connection process.

ANS:

6. Describe the structure of a Bluetooth frame.

ANS:

7. Describe the three error correction schemes used in Bluetooth.

ANS:

8. Describe the ZigBee protocol stack.

ANS:

9. Describe the IEEE 802.15.4 PHY frame format.

ANS:

10. What are the advantages and disadvantages of cluster tree networks over mesh networks?

ANS:

Chapter 6: High Rate Wireless Personal Area Networks

TRUE/FALSE

1. The WiMedia group defined two different architectures, called application profiles, for the upper layers of the protocol stack.

ANS: PTS: 1 REF: 203

2. The lower two layers of the stack (MAC and PHY), defined by the 802.15.3 standard, are implemented in software.

ANS: PTS: 1 REF: 203

3. A piconet can have only one child piconet.

ANS: PTS: 1 REF: 207

4. Ultra Wide Band (UWB) offers a promising solution to the shortage of frequencies available in the RF spectrum.

ANS: PTS: 1 REF: 214

5. Bluetooth is vulnerable to attacks in the form of Trojans, viruses, and worms.

ANS: PTS: 1 REF: 219

MULTIPLE CHOICE

1. The IEEE ____ standard defines the specifications for HR WPANs supporting speeds of 11, 22, 33, and up to 55 Mbps in the 2.4 GHz ISM band.
a. 802.11 c. 802.25.3a
b. 802.15.3 d. 802.25.3b

ANS: PTS: 1 REF: 202

2. ____ capabilities allow devices to request more channel access time in order to prioritize high-volume, time-sensitive traffic, such as voice stream.
a. Quality-of-service (QOS) c. MAC
b. PDA d. PHY

ANS: PTS: 1 REF: 203

3. ____ encodes the digital signal in such a way that single bit errors can be detected and corrected.
a. PHY modulation c. LLC modulation
b. MAC modulation d. Trellis code modulation (TCM)

ANS: PTS: 1 REF: 204-205

4. ____ piconets are separate piconets, with their own unique ID, in which the child PNC is a member of the original or parent piconet.
a. Neighbor c. Child
b. Parent d. Main

ANS: PTS: 1 REF: 206

5. ____ piconets are separate piconets that have their own PNC but that depend on the original piconet’s PNC to allocate a private block of time when their devices are allowed to transmit.
a. Neighbor c. Child
b. Parent d. Main

ANS: PTS: 1 REF: 206

6. ____ time, which means a time-dependent or synchronous transmission that must be made every frame or every so many frames to maintain the quality of the connection.
a. Synchronous c. Isochronous
b. Quality-of-service d. Asynchronous

ANS: PTS: 1 REF: 210

7. The ____ is the superframe designated by the PNC in which devices that are in power save mode wake up and listen for frames addressed to them.
a. APS superframe c. DSPS superframe
b. wake superframe d. PSPS superframe

ANS: PTS: 1 REF: 211

8. IEEE 802.15.5 is a proposed standard for ____ networking.
a. ring c. star
b. bus d. mesh

ANS: PTS: 1 REF: 213

9. ____ modulation means that the amplitude, the polarity, or the position of an analog pulse represents either a 1 or a 0.
a. Light c. Impulse
b. FHSS d. Sensor

ANS: PTS: 1 REF: 215

10. ____ modulation uses a half-cycle positive analog pulse to represent a 1 and a half-cycle negative analog pulse to represent a 0.
a. Biphase c. Loop-phase
b. Triphase d. Cyclic-phase

ANS: PTS: 1 REF: 216

11. ____ takes advantage of the fact that one of the effects of transmitting pulses that are a nanosecond long—or even shorter—is that the signal naturally spreads over a very wide frequency band, without using any spreading codes.
a. FHSS
b. DHSS
c. orthogonal frequency division multiplexing (OFDM)
d. Direct-sequence UWB (DS-UWB)

ANS: PTS: 1 REF: 216

12. ____ is an set of protocol implementation rules that will enable wireless FireWire at 400 Mbps based on an 802.15.3a/WiMedia platform.
a. MB-OFDM c. Direct-sequence UWB (DS-UWB)
b. Protocol Adaptation Layer (PAL) d. Biphase modulation

ANS: PTS: 1 REF: 218

13. In ____, hackers exploit a Bluetooth device’s ability to discover nearby devices and send unsolicited messages.
a. Bluesnarfing c. Bluespoofing
b. BlueDoS d. Bluejacking

ANS: PTS: 1 REF: 219

14. ____ uses a Bluetooth device’s ability to discover nearby devices to access contact lists and other information without the user’s knowledge, provided that the user has enabled the server functions on their device.
a. Bluesnarfing c. Bluespoofing
b. BlueDoS d. Bluejacking

ANS: PTS: 1 REF: 219

15. ____ attacks flood a Bluetooth device with so many frames that it is unable to communicate.
a. Bluejacking c. Bluesnarfing
b. Denial-of-service (DoS) d. Bluespoofing

ANS: PTS: 1 REF: 219

16. ____ is a symmetric key encryption mechanism introduced by the National Institute of Standards and Technology (NIST) in the United States.
a. RSA c. AES
b. El-Gamal d. SHA-1

ANS: PTS: 1 REF: 219-220

17. In 802.15.3AES uses a ____-bit key.
a. 64 c. 256
b. 128 d. 512

ANS: PTS: 1 REF: 220

18. ____ adds certain encrypted random data to each communications session so that the receiver can verify that the message has not been tampered with during transit.
a. AES c. Message integrity
b. 3-DES d. DES

ANS: PTS: 1 REF: 220

19. ____ is the ability of a device to move from one master or PNC to another without getting disconnected from the network in a network that extends beyond the communications range of each device that controls the communications.
a. Hand-off c. Within-range
b. Roll-over d. Catch-22

ANS: PTS: 1 REF: 221

20. ____ is the potential for technologies using the same frequency bands to interfere with each other to the extent that they sometimes perform poorly when used within close range of each other.
a. Hand-off c. Roll-over
b. Roaming d. Spectrum conflict

ANS: PTS: 1 REF: 222

21. Bluetooth uses the ISM ____ GHz band for its transmissions.
a. 2.4 c. 4.3
b. 3.1 d. 5.4

ANS: PTS: 1 REF: 222

COMPLETION

1. The ____________________ is the device that provides all of the basic communications timing in a piconet.

ANS:
piconet coordinator (PNC)
piconet coordinator
PNC

PTS: 1 REF: 206

2. Efficient data transfer in 802.15.3 networks is accomplished using ____________________.

ANS: superframes

PTS: 1 REF: 209

3. The PNC will always allocate asynchronous CTAs to destination devices that will be in DSPS or PSPS mode in the ____________________.

ANS: wake superframe

PTS: 1 REF: 211

4. Security for the IEEE 802.15.3 standard is based on the ____________________.

ANS:
Advanced Encryption Standard (AES)
Advanced Encryption Standard
AES

PTS: 1 REF: 219

5. Without message integrity, a would-be hacker could launch a(n) ____________________ attack against the piconet by capturing frames, altering them, and retransmitting them to the intended receiver.

ANS: man-in-the-middle

PTS: 1 REF: 220

MATCHING

Match each term with the correct statement below:
a. WiMedia Alliance f. Multiband orthogonal frequency division multiplexing (OFDM)
b. Beacon g. IEEE P802.15.3a project
c. Child piconet h. Hand-off
d. Contention access period (CAP) i. FireWire group of standards
e. Frame check sequence (FCS)

1. proposed enhancement to 802.15.3 that uses UWB technology to support even higher data rates for multimedia and imaging applications.

2. designated as IEEE 1394 and is supported by the 1394 Trade Association.

3. useful for extending the coverage of a piconet or for shifting some processing or storage requirements to another device.

4. formed to support the development of any necessary higher-layer protocols and software specifications for 802.15.3 and to perform various other administrative functions.

5. frame containing information about the piconet.

6. 32-bit cyclic redundancy check (CRC) field, a common technique for detecting data transmission errors.

7. used for association, to communicate commands, or for any asynchronous data that may be present in the superframe.

8. ability of a device to move from one master or PNC to another without getting disconnected from the network.

9. based on the technique used for 802.11g and 802.11a WLAN transmissions.

SHORT ANSWER

1. What are some of the potential HR WPANs applications?

ANS:

2. What are the characteristics shared by HR WPAN applications?

ANS:

3. What are the two channel plans supported by 802.15.3?

ANS:

4. Describe the IEEE 802.15.3 MAC layer functionality.

ANS:

5. What are the three 802.15.3 power-saving methods?

ANS:

6. What are the characteristics of UWB for data applications?

ANS:

7. How does MB-OFDM work?

ANS:

8. Briefly describe the competition among WPAN standards.

ANS:

9. What are the two IEEE 802.15.3 security modes?

ANS:

10. Briefly describe the hand-off limitation of the Bluetooth protocol.

ANS:

Chapter 7: Low-Speed Wireless Local Area Networks

TRUE/FALSE

1. A wireless residential gateway provides better security than connecting a computer directly to the Internet.

ANS: PTS: 1 REF: 234

2. The largest number of users that a single AP can support varies, but is generally over 1000.

ANS: PTS: 1 REF: 238

3. Infrared wireless systems send data by the intensity of the light wave instead of on-off signals of light.

ANS: PTS: 1 REF: 242

4. The 802.11b standard added two higher speeds, 5.5 Mbps and 11 Mbps, to the original 1 or 2 Mbps 802.11 standard.

ANS: PTS: 1 REF: 245

5. CSMA/CD can be used in a wireless system.

ANS: PTS: 1 REF: 249

MULTIPLE CHOICE

1. A ____ is a device that combines a router, Ethernet switch, and wireless access point.
a. DSL modem c. Cable mode
b. wireless residential gateway d. WNIC

ANS: PTS: 1 REF: 234

2. Smaller devices, such as PDAs, have two options for wireless NICs. Some offer an optional ____, which includes a Type II PC Card slot and an additional battery.
a. mini PCI c. secure digital (SD) card
b. compact flash (CF) card d. sled

ANS: PTS: 1 REF: 236

3. CF or ____ cards consist of a small circuit board that contains a dedicated controller chip and a very small antenna.
a. SD c. mini PCI
b. sled d. wireless gateway

ANS: PTS: 1 REF: 236

4. Intel has integrated all the functions of a wireless interface into a chipset called ____, which is mounted directly on the motherboard.
a. Tiger c. Centrino
b. Vegas d. Celeron

ANS: PTS: 1 REF: 236

5. A(n) ____ provides wireless LAN devices with a point of access into a wired network.
a. DSL modem c. firewall
b. Cable modem d. access point (AP)

ANS: PTS: 1 REF: 237

6. In ____ mode, wireless clients communicate directly among themselves without using an AP.
a. infrastructure c. ad hoc
b. Basic Service Set (BSS) d. Extended Service Set (ESS)

ANS: PTS: 1 REF: 238

7. A(n) ____ is simply two or more BSS wireless networks installed within the same area, providing users with uninterrupted mobile access to the network.
a. ad hoc mode c. peer-to-peer mode
b. Extended Service Set (ESS) d. Independent Basic Service Set (IBSS)

ANS: PTS: 1 REF: 239

8. Sometimes it is difficult to manage one large network. Because of this, network managers usually subdivide large networks into units known as ____ that contain fewer computers.
a. subnets c. cells
b. hives d. APs

ANS: PTS: 1 REF: 240

9. The ____ standard defines a local area network that provides cable-free data access for clients that are either mobile or in a fixed location at a rate of either 1 or 2 Mbps using either diffused infrared or RF transmission.
a. 802.2 c. 802.11
b. 802.5 d. 802.13

ANS: PTS: 1 REF: 241

10. Even though it contains data, an 802.11 frame’s size is not measured in bits but in ____.
a. time slots c. PLCP
b. PMD d. bytes

ANS: PTS: 1 REF: 242

11. The ____ translates the binary 1s and 0s of the frame into light pulses that are used for transmission.
a. PLCP c. DLC
b. PMD d. MAC

ANS: PTS: 1 REF: 243

12. The 802.11b PLCP frame preamble and header are always transmitted at ____ Mbps to allow for communication between slower and faster devices.
a. 1 c. 3
b. 2 d. 4

ANS: PTS: 1 REF: 246

13. The entire family of 802.11 standards uses an access method known as the ____ to avoid collisions.
a. logical link control (LLC) c. distributed coordination function (DCF)
b. complementary code keying (CCK) d. direct sequence spread spectrum (DSSS)

ANS: PTS: 1 REF: 249

14. ____ involves dividing the data to be transmitted from one large frame into several smaller ones.
a. RTS/CTS c. CSMA/CD
b. CSMA/CA d. Fragmentation

ANS: PTS: 1 REF: 250

15. The 802.11b standard provides for an optional polling function known as ____.
a. null data frame c. RTS/CTS
b. point coordination function (PCF) d. fragmentation

ANS: PTS: 1 REF: 252

16. When using PCF, if a client has nothing to send, then that client returns a ____ to the point coordinator.
a. null data frame c. MAC frame
b. wake superframe d. LLC frame

ANS: PTS: 1 REF: 252

17. ____ scanning involves a client listening to each available channel for a set period of time (usually 10 seconds). The client listens for a beacon frame transmitted from all available APs.
a. Passive c. Interactive
b. Active d. Polling

ANS: PTS: 1 REF: 253

18. 802.11b standard ____ allows the mobile client’s NIC to be off as much as possible to conserve battery life but still not miss out on data transmissions.
a. polling c. access media control
b. power management d. fragmentation

ANS: PTS: 1 REF: 255

19. After association and authentication between the clients and the APs are established, the ____ frames provide assistance in delivering the frames that contain the data.
a. management c. interspace
b. data d. control

ANS: PTS: 1 REF: 257

20. ____ MAC frames carry the information to be transmitted to the destination client.
a. Management c. Data
b. Control d. Traffic

ANS: PTS: 1 REF: 257

21. 802.11 ____ are designed to handle the contention for the medium among several devices attempting to communicate.
a. data frames c. management frames
b. control frames d. interframe spaces

ANS: PTS: 1 REF: 258

COMPLETION

1. A(n) ____________________ is a small card that is functionally equivalent to a standard PCI expansion card.

ANS: Mini PCI

PTS: 1 REF: 235

2. The infrastructure wireless network mode is also known as the ____________________.

ANS:
Basic Service Set (BSS)
Basic Service Set
BSS

PTS: 1 REF: 239

3. ____________________ translates four data bits into 16 light impulses, which are then transmitted to the receiving device.

ANS:
16-pulse position modulation (16-PPM)
16-pulse position modulation
16-PPM

PTS: 1 REF: 244

4. If two computers start sending messages at the same time, a(n) ____________________ results and the data becomes scrambled.

ANS:ollision

PTS: 1 REF: 248

5. CSMA/CA reduces collisions by using explicit ____________________.

ANS:
packet acknowledgment (ACK)
packet acknowledgment
ACK

PTS: 1 REF: 250

MATCHING

Match each term with the correct statement below:
a. NIC f. SSID
b. Ad hoc mode g. Reassociation
c. 802.11b standard h. traffic indication map (TIM)
d. PLCP standards for 802.11b i. 802.11b management frames
e. Complementary Code Keying (CCK)

1. also known as Wi-Fi

2. device that connects the computer to the network so that it can send and receive data

3. based on direct sequence spread spectrum (DSSS)

4. process of a client dropping the connection with one AP and reestablish the connection with another

5. list of the clients that have buffered frames waiting at the AP

6. used to set up the initial communications between a client and the AP

7. table containing 64 8-bit code words

8. also known as peer-to-peer mode, although its formal name is the Independent Basic Service Set (IBSS) mode

9. identifier unique to each AP

SHORT ANSWER

1. What are the functions performed by a WNIC?

ANS:

2. What are the two basic functions of an AP?

ANS:

3. How does dynamic rate selection work?

ANS:

4. What is power over Ethernet?

ANS:

5. Briefly describe the two sublayers of the 802.11 PHY layer.

ANS:

6. What are the fields of the 802.11b PLCP frame?

ANS:

7. Briefly describe the 802.11b Media Access Control layer.

ANS:

8. How does CSMA/CD work?

ANS:

9. How does the Request to Send/Clear to Send (RTS/CTS) protocol work?

ANS:

10. What are the functions performed by each type of interframe space?

ANS:

Chapter 8: High-Speed WLANs and WLAN Security

TRUE/FALSE

1. The 802.11a standard maintains the same medium access control (MAC) layer functions as 802.11b WLANs.

ANS: PTS: 1 REF: 276

2. The 802.11a standard made changes only to the MAC layer of the original 802.11 and 802.11b standards.

ANS: PTS: 1 REF: 284

3. The PLCP frame formats used in 802.11g are the same as for 802.11b.

ANS: PTS: 1 REF: 287

4. 802.11e allows the receiving device to acknowledge after receiving a burst of frames.

ANS: PTS: 1 REF: 289

5. The amount of time required by 802.11 devices to associate with one access point and disassociate with the other is in the order of thousands of milliseconds.

ANS: PTS: 1 REF: 291

MULTIPLE CHOICE

1. IEEE 802.11 a has a maximum rated standard speed of ____ Mbps.
a. 6 c. 24
b. 12 d. 54

ANS: PTS: 1 REF: 275

2. The 802.11b standard uses one part of the unlicensed ____ band for its transmissions.
a. ISM c. MAC
b. U-NII d. PHY

ANS: PTS: 1 REF: 276

3. The 802.11a standard uses the ____ band for its transmissions.
a. ISM c. MAC
b. U-NII d. PHY

ANS: PTS: 1 REF: 276

4. With 802.11b the available frequency spectrum (2.412 to 2.484 GHz) is divided into ____ channels in the United States.
a. 3 c. 11
b. 6 d. 14

ANS: PTS: 1 REF: 278

5. In 802.11a, ____ frequency channels operate simultaneously in the Low Band (5.15 to 5.25 GHz) and Middle Band (5.25 to 5.35 GHz).
a. 3 c. 11
b. 8 d. 14

ANS: PTS: 1 REF: 278

6. In 802.11a, transmitting at 24 Mbps requires a ____ technique.
a. phase shift keying (PSK)
b. quadrature phase shift keying (QPSK)
c. 16-level quadrature amplitude modulation (16-QAM)
d. 64-level quadrature amplitude modulation (64-QAM)

ANS: PTS: 1 REF: 282

7. In 802.11a, data rates of 54 Mbps are achieved by using ____.
a. phase shift keying (PSK)
b. quadrature phase shift keying (QPSK)
c. 16-level quadrature amplitude modulation (16-QAM)
d. 64-level quadrature amplitude modulation (64-QAM)

ANS: PTS: 1 REF: 283

8. The IEEE 802.11g standard specifies that it operates in the same frequency band as ____.
a. 802.11b c. 802.11t
b. 802.11i d. 802.11z

ANS: PTS: 1 REF: 285-286

9. When both 802.11b and 802.11g devices share the same network, the 802.11g standard defines how the frame header is transmitted at 1 or 2 Mbps using ____.
a. OFDM c. PSK
b. 16-QAM d. DSSS

ANS: PTS: 1 REF: 287

10. PBCC uses a ____ state code (the spreading code) to send 8 bits per transmission symbol.
a. 128 c. 512
b. 256 d. 1024

ANS: PTS: 1 REF: 288

11. IEEE ____ defines enhancements to the MAC layer of 802.11 to expand support for LAN applications that require Quality of Service (QoS).
a. 802.11e c. 802.11i
b. 802.11g d. 802.11s

ANS: PTS: 1 REF: 288

12. ____ is a proposed standard aimed at providing data rates higher than 100 Mbps using the 2.4 GHz ISM band.
a. 802.11e c. 802.11n
b. 802.11g d. 802.11r

ANS: PTS: 1 REF: 290

13. ____ technology uses multiple antennas and also uses the reflected signals (multipath) to extend the range of the WLAN.
a. Multiple-in, multiple-out (MIMO) c. Handoff
b. voice over wireless LAN (VoWLAN) d. Quality of Service (QoS)

ANS: PTS: 1 REF: 290

14. A ____ in a WLAN happens when a computer or a handset connects with a new access point and disconnects from the previous one.
a. VoWLAN c. QoS
b. MIMO d. handoff

ANS: PTS: 1 REF: 291

15. ____ offers high-speed wireless connectivity with up to 54 Mbps and seamless connectivity with other types of communications systems, such as cellular telephone systems and FireWire networks.
a. 802.11a c. HiperLAN/2
b. 802.11e d. VoWLAN

ANS: PTS: 1 REF: 293

16. A ____ allows you to use an existing wireless or wired network to stream music and video files from your computer or from the Internet directly to your TV or stereo system.
a. wireless presentation gateway c. wireless VoIP gateway
b. wireless media gateway d. Wireless gaming adapter

ANS: PTS: 1 REF: 296

17. ____ is a process that verifies that the client device has permission to access the network.
a. Privacy c. WEP
b. Data encryption d. Authentication

ANS: PTS: 1 REF: 298

18. ____ standards attempt to ensure that transmissions are not read by unauthorized users, even if those transmissions fall into the wrong hands.
a. Privacy c. WEP
b. Data encryption d. Authentication

ANS: PTS: 1 REF: 298

19. The 802.11 standard provides an optional ____ specification for data encryption between wireless devices to prevent eavesdropping.
a. PSK c. QAM
b. WEP d. WEB

ANS: PTS: 1 REF: 298

20. WPA uses a 128-bit ____, which is also called personal mode.
a. OFDM c. pre-shared key (PSK)
b. initialization vector (IV) d. static key

ANS: PTS: 1 REF: 300

21. 802.1X uses the ____ for relaying access requests between a wireless device, the AP, and the RADIUS server.
a. Extensible Authentication Protocol (EAP)
b. robust security network association (RSNA)
c. temporal key integrity protocol (TKIP)
d. message integrity check (MIC)

ANS: PTS: 1 REF: 301

COMPLETION

1. 802.11b wireless NICs can legally radiate as much as ____________________ watt in the ISM band.

ANS:
1
one

PTS: 1 REF: 277

2. A(n) ____________________ processor, or equalizer, is required in 802.11b systems to unravel the delayed radio frequency signals as they are received.

ANS:aseband

PTS: 1 REF: 280

3. The ____________________ of an 802.11a PLCP frame allows the receiving device to prepare for the rest of the frame.

ANS: preamble

PTS: 1 REF: 284

4. A(n) ____________________ user is one that moves frequently but does not use the equipment while in motion.

ANS: nomadic

PTS: 1 REF: 290

5. ____________________ are designed to connect two wired networks or to extend the range of a WLAN.

ANS: Wireless bridges

PTS: 1 REF: 293

MATCHING

Match each term with the correct statement below:
a. IEEE 802.11a f. Wireless presentation gateway
b. U-NII band g. Wi-Fi protected access (WPA)
c. Primary function of OFDM h. WPA2
d. HCF i. robust security network association (RSNA)
e. HiperLAN/2

1. called Wi-Fi by the Wi-Fi Alliance.

2. a grouping of several security functions that protects data frames by providing mutual authentication between client devices and access points, controlled access to the network, establishment of security keys, and key management.

3. split a high-speed digital signal into several slower signals running in parallel.

4. combination of DCF and point coordination function (PCF).

5. intended for devices that provide short-range, high-speed wireless digital communications.

6. high-speed WLAN technology that is similar to the IEEE 802.11a standard.

7. version of WPA that has been certified by the IEEE to be compatible with IEEE 802.11i.

8. devices that facilitate business presentations by allowing one or more computers to connect wirelessly to any display projector.

9. standard for network authentication and encryption introduced by the Wi-Fi Alliance, in response to the weaknesses in WEP.

SHORT ANSWER

1. What are the disadvantages of using multipath distortion?

ANS:

2. How does OFDM work?

ANS:
Instead of sending one long stream of data across a single channel, OFDM sends the transmission in parallel across several lower-speed channels. The sending device breaks the transmission down into pieces and then sends it over the channels in parallel. The receiving device combines the signals received from the individual channels to re-create the transmission. By using parallel transmission channels, OFDM can combine several lower-speed channels to send data at a higher speed.

PTS: 1 REF: 280

3. How does error correction work in 802.11a?

ANS:

4. What are the fields of an 802.a PLCP frame?

ANS:

5. What are the optional transmission modes specified by the IEEE 802.11g standard?

ANS:

6. Describe one of the limitations of 802.11n.

ANS:

7. What are the main benefits of using 802.11r?

ANS:

8. How can a WLAN be extended using wireless bridges or repeaters?

9. What is wireless switching?

ANS:

10. What are WEP five major characteristics?

ANS:

Chapter 9: Wireless Metropolitan Area Networks

TRUE/FALSE

1. Even today, most last mile connections are based on copper wiring.

ANS: PTS: 1 REF: 314

2. Point-to-point long-distance microwave links use high-power signals that are suitable or safe for use, even in crowded city skylines.

ANS: PTS: 1 REF: 316

3. An LMDS signal can only travel up to 5 miles (8 kilometers).

ANS: PTS: 1 REF: 324

4. Because they operate at a lower frequency than LMDS signals, MMDS signals can travel only short distances.

ANS: PTS: 1 REF: 329

5. Unlike Ethernet and other protocols, the WiMAX MAC layer is connectionless.

ANS: PTS: 1 REF: 335

MULTIPLE CHOICE

1. For long-distance connections between cities and states, copper-based digital communications lines, such as T1, require the signal to be regenerated every ____.
a. 3,000 feet (0.9 kilometers) c. 9,000 feet (2.7 kilometers)
b. 6,000 feet (1.8 kilometers) d. 12,000 feet (3.6 kilometers)

ANS: PTS: 1 REF: 315

2. The term ____ refers to telephone, cable TV, and other communications providers who own the wires and transmission towers that carry voice and data traffic.
a. carrier c. DSL
b. T1 d. fiber-optic

ANS: PTS: 1 REF: 315

3. Microwave towers are installed roughly ____ miles apart from each other.
a. 15 c. 35
b. 23 d. 60

ANS: PTS: 1 REF: 316

4. A ____ connection is a company’s internal infrastructure connection.
a. fixed wireless c. microwave
b. last mile d. backhaul

ANS: PTS: 1 REF: 316

5. A ____ transmission sends multiple signals at different frequencies.
a. broadband c. uniband
b. baseband d. uniqueband

ANS: PTS: 1 REF: 317

6. A ____ transmission treats the entire transmission medium as if it were only one channel.
a. fullband c. broadband
b. baseband d. spectrumband

ANS: PTS: 1 REF: 317

7. In ____, the transmitted beam is purposely allowed to spread, or diverge, so that by the time it arrives at the receiving device it forms a fairly large optical cone.
a. active tracking c. scintillation
b. spatial diversity d. beam divergence

ANS: PTS: 1 REF: 321

8. LMDS can transmit from 51 to ____ Mbps downstream.
a. 55 c. 155
b. 110 d. 256

ANS: PTS: 1 REF: 322

9. A(n) ____ connects to other services, such as a local area network or telephone system.
a. hub transceiver c. LMDS bridge
b. LMDS cell d. network interface unit (NIU)

ANS: PTS: 1 REF: 327

10. IEEE ____ is the standard for wireless broadband metropolitan area networks.
a. 802.3 c. 802.16
b. 802.11 d. 802.21

ANS: PTS: 1 REF: 331

11. In 802.16, a ____ can be either a laptop computer or device that attaches to a LAN.
a. base station (BS) c. hub transceiver
b. subscriber station (SS) d. pizza box antenna

ANS: PTS: 1 REF: 331

12. The term ____ stands for worldwide interoperability for microwave access.
a. WiMAX c. LDMS
b. MMDS d. FSO

ANS: PTS: 1 REF: 332

13. ____ are the devices that are installed in a customer’s office or home.
a. Base stations c. Customer premises equipment (CPE)
b. Pizza box antennas d. MIMO antennas

ANS: PTS: 1 REF: 332-333

14. ____ is a transmission convergence that support TV (video), telephone (voice), and data on the same network.
a. CPE c. MMDS
b. LMDS d. Triple-play

ANS: PTS: 1 REF: 333

15. A data transmission to or from a single device is called a ____ in the 802.16 standard.
a. burst c. BS
b. CPE d. TDD

ANS: PTS: 1 REF: 336

16. WiMAX allows the use of two different frequency channels, in which case one is used for downlink and another for uplink. This mechanism is called ____.
a. time division duplexing (TDD) c. burst
b. frequency division duplexing (FDD) d. multiple input, multiple output (MIMO)

ANS: PTS: 1 REF: 337

17. The 802.16 standard defines several transmission ____, which are sets of predefined connection parameters.
a. profiles c. CPE
b. Truck-rolls d. SSs

ANS: PTS: 1 REF: 340

18. A WiMAX ____ is a combination of the basic profile and one of the transmission profiles and is preset on the equipment before it is shipped to an end-user site.
a. truck-rolls c. DL-MAP
b. latency d. system profile

ANS: PTS: 1 REF: 340

19. A(n) ____ can transmit multiple simultaneous signals in different directions to stations that fall within the range of each of the antennas.
a. customer premises equipment (CPE) c. MIMO antenna
b. advanced antenna system (AAS) d. pizza box antenna

ANS: PTS: 1 REF: 343

20. ____ is the maximum delay variation between two consecutive packets over a period of time.
a. AAS c. Jitter
b. Latency d. CID

ANS: PTS: 1 REF: 343

21. ____ are messages digitally signed by a certification authority.
a. Traffic encryption keys (TEKs) c. Data encryption standard
b. Message authentication codes d. Digital certificates

ANS: PTS: 1 REF: 345

COMPLETION

1. _____________________________________________ are a group of technologies that provide wireless connectivity across a substantial geographical area such as a large city.

ANS:
Wireless metropolitan area networks (WMANs)
Wireless metropolitan area networks
WMANs

PTS: 1 REF: 314

2. Microwave transmissions take place in the 3 to 30 GHz range of the electromagnetic spectrum known as the ______________________________ band.

ANS:
super high frequency (SHF)
super high frequency
SHF

PTS: 1 REF: 315

3. ____________________ is defined as the temporal and spatial variations in light intensity caused by atmospheric turbulence.

ANS: Scintillation

PTS: 1 REF: 320

4. In 802.16, a(n) ____________________ is the transmitter connected to the carrier network or to the Internet.

ANS:
base station (BS)
base station
BS

PTS: 1 REF: 331

5. _________________________, as the term implies, is when the transmitter antenna cannot be seen from the receiver end or vice-versa.

ANS:
Non-line-of-sight (NLOS)
Non-line-of-sight
NLOS

PTS: 1 REF: 337

MATCHING

Match each term with the correct statement below::
a. last mile connection f. Multichannel multipoint distribution service (MMDS)
b. Microwaves g. WiMAX Forum
c. Free space optics (FSO) h. WirelessMAN-SC (single carrier)
d. Active tracking i. Latency
e. Local multipoint distribution service (LMDS)

1. dedicated to promoting the implementation of 802.16 by testing and certifying equipment for compatibility and interoperability.

2. used for point-to-point connections in the 10 to 66 GHz bands.

3. amount of time delay that it takes a packet to travel from source to destination device.

4. higher frequency RF waves.

5. based on movable mirrors that control the direction in which the beams are sent.

6. fixed broadband wireless technology that has many similarities to LMDS.

7. fixed broadband technology that can provide a wide variety of wireless services.

8. link between a customer and ISP.

9. optical, wireless, point-to-point, line-of-sight broadband technology.

SHORT ANSWER

1. What are the two primary goals of a WMAN?

ANS:

2. What is fixed wireless?

ANS:

3. Describe some of the main characteristics of free space optics (FSO).

ANS:

4. What is spatial diversity?

PTS: 1 REF: 320

5. What are some of the applications of FSO?

ANS:

PTS: 1 REF: 321-322

6. What are the disadvantages of LDMS?

ANS:

PTS: 1 REF: 328

7. What are some of the advantages of MMDS?

ANS:

8. Briefly define the 802.16-2001 and 802.16-2004 standards.

ANS:

9. What are the two additional Physical layer transmission mechanisms introduced by 802.16 to support NLOS applications?

ANS:

10. What are the three data encryption algorithms supported by WiMAX?

ANS:

Chapter 10: Wireless Wide Area Networks

TRUE/FALSE

1. SMS messages are brief, limited to about 160 characters in length (or 70 characters for non-Latin Arabic and Chinese characters).

ANS: PTS: 1 REF: 357

2. In cellular telephone networks, all of the transmitters and cell phones operate at a low power level.

ANS: PTS: 1 REF: 359

3. The only major feature that 2G systems share with 1G is that they are packet-switched networks.

ANS: PTS: 1 REF: 364

4. If the network transition is from a 2G CDMA network, instead of migrating to CDMA2000 1xRTT, the transition to 2.5G is to GPRS.

ANS: PTS: 1 REF: 368

5. Because they orbit so close to Earth, LEO satellites must travel at low speeds so that the Earth’s gravity will not pull them back into the atmosphere.

ANS: PTS: 1 REF: 380

MULTIPLE CHOICE

1. ____ use cellular telephone and satellite technology to connect users to a voice or data network through e-mail and Internet connections.
a. WPANs c. WMANs
b. WLANs d. WWANs

ANS: PTS: 1 REF: 355

2. ____ allows for the delivery of short, text-based messages between wireless devices such as cellular telephones and pagers.
a. SMS c. XML
b. CDMA d. WML

ANS: PTS: 1 REF: 357

3. In a cellular telephony network, the coverage area is divided into smaller individual sections, called ____.
a. roaming c. handoff
b. cells d. cards

ANS: PTS: 1 REF: 358

4. When the cell phone is turned on, it listens for the SID being transmitted by the base station on the ____ channel.
a. CDMA c. control
b. GSM d. EDGE

ANS: PTS: 1 REF: 361

5. The first generation of wireless cellular technology is known as ____.
a. Generation 0 (0G) c. Second Generation (2G)
b. First Generation (1G) d. 2.5 Generation (2.5G)

ANS: PTS: 1 REF: 363

6. 2G networks transmit data between 9.6 Kbps and ____ Kbps in the 800 MHz and 1.9 GHz frequencies.
a. 10.2 c. 14.4
b. 12.3 d. 16.6

ANS: PTS: 1 REF: 364

7. These three technologies—TDMA, CDMA, and ____—make up the backbone of 2G digital cellular telephony.
a. FDMA c. DSSS
b. GSM d. PSK

ANS: PTS: 1 REF: 366

8. The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.
a. circuit-switched c. frame-switched
b. path-switched d. packet-switched

ANS: PTS: 1 REF: 367

9. The next step beyond GPRS is ____.
a. CDMA2000 1xRTT
b. Enhanced Data rates for GSM Evolution (EDGE)
c. CDMA2000 1xEVDO
d. TDMA

ANS: PTS: 1 REF: 367

10. EDGE is based on a modulation technique called ____, in which the phase of the carrier is shifted in 45-degree increments and 4 bits can be transmitted per phase change.
a. DSSS c. 8-PSK
b. TDMA d. EVO

ANS: PTS: 1 REF: 368

11. Beyond W-CDMA, the upgrade path is to ____, which can transmit at 8 to 10 Mbps downstream.
a. CDMA2000 1xRTT
b. CDMA2000 1xEVDO
c. CDMA2000 1xEVDV
d. High-Speed Downlink Packet Access (HSDPA)

ANS: PTS: 1 REF: 369

12. A WAP cell phone runs a tiny browser program called a microbrowser that uses ____ instead of HTML.
a. WML c. XHTML
b. XML d. EWML

ANS: PTS: 1 REF: 371

13. A WML document is called a deck that contains one or more blocks, known as ____.
a. cells c. packets
b. frames d. cards

ANS: PTS: 1 REF: 372

14. The ____ programming language was developed by Sun Microsystems as an object-oriented language used for general-purpose business programming as well as interactive Web sites.
a. C c. Java
b. C++ d. J#

ANS: PTS: 1 REF: 373

15. ____ is a thin software environment, a very small program that resides on a wireless device and is capable of running applications that can be downloaded by the device on demand.
a. BREW c. J2ME
b. Java d. i-mode

ANS: PTS: 1 REF: 374

16. ____ satellites circle the Earth at an altitude of 200 to 900 miles (321 to 1,448 kilometers).
a. HEO c. MEO
b. LEO d. GEO

ANS: PTS: 1 REF: 380

17. ____ satellites orbit the Earth at altitudes between 1,500 and 10,000 miles (2,413 to 16,090 kilometers).
a. HEO c. MEO
b. LEO d. GEO

ANS: PTS: 1 REF: 382

18. Some MEO satellites revolve in elongated orbits called ____.
a. LEO c. HEO
b. PEO d. GEO

ANS: PTS: 1 REF: 382

19. A MEO signal takes from 50 to ____ milliseconds to make the round trip.
a. 150 c. 300
b. 250 d. 350

ANS: PTS: 1 REF: 382

20. ____ satellites are stationed at an altitude of 22,282 miles (35,860 kilometers).
a. HEO c. MEO
b. LEO d. GEO

ANS: PTS: 1 REF: 383

21. A ____ satellite orbit matches the rotation of the Earth and moves as the Earth moves.
a. LEO c. GEO
b. MEO d. HEO

ANS: PTS: 1 REF: 383

COMPLETION

1. A(n) ___________________________________ spans a geographical area as large as an entire country or even the entire world.

ANS:
wireless wide area network (WWAN)
wireless wide area network
WWAN

PTS: 1 REF: 355

2. In a cellular telephony network, each base station is connected to a(n) __________________________________________________.

ANS:
mobile telecommunications switching office (MTSO)
mobile telecommunications switching office
MTSO

PTS: 1 REF: 358

3. 1G technology is based on the ________________________________________.

ANS:
Advanced Mobile Phone Service (AMPS)
Advanced Mobile Phone Service
AMPS

PTS: 1 REF: 363

4. For TDMA or GSM 2G networks, the upgrade path is a 2.5G technology known as ___________________________________.

ANS:
General Packet Radio Service (GPRS)
General Packet Radio Service
GPRS

PTS: 1 REF: 367

5. WML is based on the ___________________________________.

ANS:
Extensible Markup Language (XML)
Extensible Markup Language
XML

PTS: 1 REF: 372

MATCHING

Match each term with the correct statement below:
a. MTSO f. i-mode
b. CDMA g. GEO satellite latency
c. GSM h. GEO satellite lifespan
d. EDGE i. Average lifespan of a LEO satellite
e. 3G

1. about 250 milliseconds.

2. intended to be a uniform and global standard for cellular wireless communication.

3. developed in Europe as a standard for public mobile communications in the 1980s.

4. 12 to 15 years.

5. link between the cellular network and the wired telephone world and controls all transmitters and base stations in the cellular network.

6. Internet access system owned by the Japanese corporation NTT DoCoMo.

7. considered a booster for GPRS systems and can transmit up to 384 Kbps.

8. type of multiple access technology.

9. five years.

SHORT ANSWER

1. What are some of the applications of digital cellular telephones?

ANS:

2. What are some of the applications of SMS?

ANS:

3. What is the difference between handoff and roaming?

ANS:

4. What are some of the improvements provided by digital transmissions over analog transmissions?

ANS:

PTS: 1 REF: 365

5. What are the two major advantages that packet switching has over circuit switching?

ANS:

6. Briefly describe the CDMA2000 1xEVDO and CDMA2000 1xEVDV transmission technologies.

ANS:

7. Briefly describe WAP2.

ANS:

8. What are the modulation techniques used by satellite transmissions?

ANS:

9. What are the multiplexing techniques used by satellite transmissions?

ANS:

10. Briefly describe the characteristics of HEO satellites.

ANS:

Chapter 11: Radio Frequency Identification

TRUE/FALSE

1. RFID uses radio frequency waves instead of laser light to read a product code.

ANS: PTS: 1 REF: 394

2. Chipless tags can be used to identify paper-based documents uniquely and inconspicuously.

ANS: PTS: 1 REF: 398

3. Smaller antennas allow the tags to be read at greater distances than larger antennas.

ANS: PTS: 1 REF: 400

4. RFID system software is responsible for processing orders, inventory, shipments, invoices, and so on.

ANS: PTS: 1 REF: 402

5. The UHF specifications define the tag-to-reader data rate as twice that of the reader-to-tag.

ANS: PTS: 1 REF: 408

MULTIPLE CHOICE

1. ____ is an organization entrusted by industries worldwide to establish RFID standards and services.
a. EPCglobal c. IEEE
b. ISO d. IETF

ANS: PTS: 1 REF: 394

2. The ____ is a standardized numbering scheme that can be programmed in a tag and attached to any physical product.
a. EPCglobal c. electronic product code (EPC)
b. Universal Product Code (UPC) d. RFID

ANS: PTS: 1 REF: 395

3. RFID tags are also commonly known as ____.
a. transceivers c. transantennas
b. receivers d. transponders

ANS: PTS: 1 REF: 396

4. A typical RFID ____ includes an integrated circuit that contains some non-volatile memory and a simple microprocessor.
a. software c. middleware
b. tag d. business application

ANS: PTS: 1 REF: 396

5. ____ tags can be produced in large quantities at low cost, and do not require battery power.
a. Active c. Powered
b. Semi-active d. Passive

ANS: PTS: 1 REF: 396

6. ____ tags are equipped with a battery to power the microprocessor chip and memory.
a. Active c. Powered
b. Semi-active d. Passive

ANS: PTS: 1 REF: 397

7. All three types of RFID tags can be produced in flexible packages, also called ____.
a. 1-bit tags c. beacons
b. smart labels d. semi-active tags

ANS: PTS: 1 REF: 397

8. ____ tags can be equipped with thermal, gas, smoke, pressure, and a variety of other kinds of sensors.
a. Chipless c. Sensory
b. 1-bit d. Semi-active

ANS: PTS: 1 REF: 398

9. ____ is usually stored in read-only memory (ROM) or flash memory and is present in both the tag and the reader.
a. System software c. Business application software
b. Middleware d. Antenna software

ANS: PTS: 1 REF: 401

10. ____ is responsible for reformatting the data from the readers to comply with the formats required by the business applications.
a. System software c. Business application software
b. Middleware d. Antenna software

ANS: PTS: 1 REF: 401

11. The connection between the tag and reader is called ____.
a. a continuous wave c. a coupling
b. backscatter d. middleware

ANS: PTS: 1 REF: 404

12. Both reader and tag modulate the signal in amplitude by as much as 100% or by as little as ____%.
a. 2 c. 8
b. 5 d. 10

ANS: PTS: 1 REF: 404

13. The RFID ____ layer defines three methods that allow an interrogator to manage the population of tags within reach of its signal: select, inventory, and access.
a. PHY c. MAC
b. tag identification d. LLC

ANS: PTS: 1 REF: 406

14. After the ____ is transmitted by the reader, the tag is permanently disabled and can never be read or written to again.
a. EPC c. UPC
b. CRC d. destroy password

ANS: PTS: 1 REF: 406

15. The specifications for HF tags call for readers to be capable of reading ____ tags per second.
a. 100 c. 200
b. 130 d. 230

ANS: PTS: 1 REF: 408

16. In North America, the allowed tag-to-reader data rate can be up to ____ Kbps.
a. 140.35 c. 220.94
b. 160.45 d. 256

ANS: PTS: 1 REF: 408

17. In Europe, due to the RF signal power limitations, the maximum tag-to-reader data rate is ____ Kbps.
a. 15 c. 30
b. 22 d. 45

ANS: PTS: 1 REF: 408

18. Reader-to-tag data rate is ____ Kbps in North America.
a. 65.76 c. 88.12
b. 70.18 d. 91.43

ANS: PTS: 1 REF: 408

19. Reader-to-tag data rate is ____ Kbps in Europe.
a. 5 c. 11
b. 8 d. 15

ANS: PTS: 1 REF: 408

20. A ____ tag is a device that can be used to simulate the presence of a virtually infinite number of tags.
a. blocker c. 1-bit
b. semi-active d. chipless

ANS: PTS: 1 REF: 413

21. ____ tags can be used to disable unauthorized readers from accessing the information from a selective group of tags.
a. Chipless c. Blocker
b. 1-bit d. Smart label

ANS: PTS: 1 REF: 413

COMPLETION

1. RFID stores product information in electronic ____________________ that contain an antenna and a chip.

ANS:ags

PTS: 1 REF: 394

2. One class of active tags is called ____________________ because they transmit on a periodic basis, without receiving an interrogation from a reader.

ANS:eacons

PTS: 1 REF: 397

3. With EPCs, companies will be able to acquire the manufacturer’s name over the Internet using a service from EPCglobal Inc. called _________________________.

ANS:
Object Name Service (ONS)
Object Name Service
ONS

PTS: 1 REF: 402

4. HF RFID transmission uses a protocol called _____________________________________________, in which the tags reply within randomly selected positions or time intervals, referred to as slots.

ANS:
slotted terminating adaptive protocol (STAC)
slotted terminating adaptive protocol
STAC

PTS: 1 REF: 405

5. The RFID ____________________ layer is responsible for establishing and communicating the transmission parameters that are used for communications at the PHY layer.

ANS: MAC

PTS: 1 REF: 408

MATCHING

Match each term with the correct statement below:
a. Radio frequency identification (RFID) f. Backscatter
b. Reader g. Continuous wave (CW)
c. Passive tags h. Major challenge for the RFID systems
d. 1-bit tags i. Destroy password
e. Antennas

1. permanently disables the tag.

2. passive devices used in retail stores.

3. reflection of radiation.

4. device that captures and processes the data received from the tags.

5. impact of the volume of data on a company’s network.

6. most common type of RFID tags.

7. unmodulated sine wave.

8. convert the RF energy from the transmitter into electromagnetic waves.

9. technology similar to barcode labels.

SHORT ANSWER

1. What are the fields of an EPC?

ANS:

2. What are the main characteristics of semi-active RFID tags?

ANS:

3. What are the main characteristics of chipless tags?

ANS:

4. What are the two classes of RFID tags?

ANS:

5. What are the main characteristics of an RFID reader?

ANS:

6. What are the two main types of tag antennas?

ANS:

7. What are the two types of coupling supported by RFID?

ANS:

8. Explain the three methods that allow an RFID interrogator to manage the population of tags within reach of its signal.

ANS:

9. Explain how RFID is used to provide automobile security.

ANS:

10. Explain how RFID can be applied to the pharmaceutical industry.

ANS:

Chapter 12: Wireless Communications in Business

TRUE/FALSE

1. Wireless technology can provide access to corporate data from almost any location.

ANS: PTS: 1 REF: 422

2. Wireless technology can help improve the support that information technology (IT) departments provide to users.

ANS: PTS: 1 REF: 424

3. Troubleshooting a wireless network is often harder than troubleshooting cabling problems.

ANS: PTS: 1 REF: 424

4. Change can be painful for users because it takes time and energy to learn a new system.

ANS: PTS: 1 REF: 428

5. ROI is best expressed over a specific period of time.

ANS: PTS: 1 REF: 433

MULTIPLE CHOICE

1. Industry experts agree that ____ is the greatest advantage of wireless technology.
a. reduced costs
b. access to corporate data from almost anywhere
c. increased bandwidth
d. increased security

ANS: PTS: 1 REF: 423

2. Two of the most significant advantages for IT departments are easier system setup and ____ compared to wired systems.
a. increased bandwidth c. decreased cabling costs
b. user authentication d. better security

ANS: PTS: 1 REF: 424

3. ____ takes advantage of Voice over IP (VoIP) technology but instead of using the wired network to carry voice calls, VoWLAN uses the wireless infrastructure to carry both voice and data.
a. VoWLAN c. WMAN
b. WLAN d. WiMAX

ANS: PTS: 1 REF: 425

4. ____ phones enable you to use the WLAN for regular telephone calls.
a. SOHO c. QoS
b. DSL d. Wireless VoIP

ANS: PTS: 1 REF: 425

5. ____ are essentially the same device as a wireless residential gateway but are preconfigured by the service provider to connect to its network and allow regular telephone calls to be made over the Internet.
a. Wireless VoIP SOHO routers c. Cable modem
b. DSL modem d. WLAN routers

ANS: PTS: 1 REF: 425

6. Bluetooth’s primary application is ____.
a. multimedia distribution c. cable replacement
b. data for product identification d. residential and industrial control

ANS: PTS: 1 REF: 426

7. WiMedia’s primary application is ____.
a. data for product identification c. cable replacement
b. multimedia distribution d. residential and industrial control

ANS: PTS: 1 REF: 426

8. ____ can help to identify why a new technology may be needed.
a. Calculating ROI c. New standards
b. Determining costs d. Assessing the current network

ANS: PTS: 1 REF: 430

9. The information you gather about the current network in preparation for implementing a WLAN will not be complete without a proper ____.
a. request for proposal c. request for comments
b. wireless site survey d. request for costs

ANS: PTS: 1 REF: 432

10. In strict accounting terms, ____ is the profit divided by the investment.
a. VoIP c. RFP
b. RFI d. ROI

ANS: PTS: 1 REF: 433

11. ____ costs are costs that are necessary to start a project.
a. Permanent c. Upfront
b. Recurring d. Continuous

ANS: PTS: 1 REF: 433

12. A(n) ____ cost is a cost that a user may continue to pay over an extended period of time.
a. recurring c. initial
b. upfront d. one-time

ANS: PTS: 1 REF: 434

13. A ____ is a detailed planning document that is sent to potential vendors with precise specifications for the products and services that the organization intends to buy.
a. request for comments c. request for investment
b. request for information d. request for proposal

ANS: PTS: 1 REF: 434

14. In a ____ the company has usually preselected the equipment and is simply asking different vendors to provide their most competitive pricing.
a. request for quotation c. request for information
b. request for comments d. request for proposal

ANS: PTS: 1 REF: 435

15. A(n) ____ can design and create a wireless application to run on a specific range of devices, and can often deliver the software, hardware, security, and networks as one complete package.
a. RFQ c. WASP
b. RFP d. RFI

ANS: PTS: 1 REF: 437

16. After the RFPs have been received and the vendor has been selected, it is important to perform a limited trial, also known in the industry as a(n) ____.
a. RFI c. RFQ
b. pilot project d. WASP

ANS: PTS: 1 REF: 437

17. After a new technology has been tested thoroughly, the next step is to ____.
a. calculate the ROI c. begin training
b. ask for an RFP d. ask for an RFQ

ANS: PTS: 1 REF: 437

18. ____ provides all users as well as support specialists with the knowledge to effectively operate and support the new wireless technology.
a. Training c. RFQ
b. RFI d. RFP

ANS: PTS: 1 REF: 437

19. ____ is the continued follow-up for answering questions and assisting users.
a. Training c. Pilot project
b. Support d. Initial test

ANS: PTS: 1 REF: 438

20. A ____ is a central point of contact for users who need assistance using technology.
a. WASP c. wireless FSO
b. SOHO router d. help desk

ANS: PTS: 1 REF: 439

21. The ____ manages customer problems and requests, and also provides support services to solve the problem.
a. help desk c. wireless AP
b. SOHO router d. FSO AP

ANS: PTS: 1 REF: 439

COMPLETION

1. ____________________ phones are the telephone handsets that connect to a WLAN’s access point (AP).

ANS: Wireless VoIP

PTS: 1 REF: 425

2. ____________________ routers can be connected to a DSL or cable modem and provide both a WLAN and telephone services through the user’s Internet connection.

ANS: Wireless VoIP SOHO

PTS: 1 REF: 425

3. A(n) ______________________________ is a document that seeks information about what vendors may have to offer.

ANS:
request for information (RFI)
request for information
RFI

PTS: 1 REF: 432

4. A(n) ____________________ consists of measuring the strength and quality of the signal and the resulting transmission speeds and throughput achievable in all the different locations.

ANS: wireless site survey

PTS: 1 REF: 432

5. Determining the cost in relationship to the benefits is known as calculating ______________________________.

ANS:
return on investment (ROI)
return on investment
ROI

PTS: 1 REF: 433

MATCHING

Match each item with an statement below:
a. Vonage f. RFQs
b. SOHO g. External consultants
c. ZigBee primary application h. Pilot project
d. WLANs—802.11a/b/g/n i. Help desk
e. ROI projections

1. acronym for small office/home office.

2. wireless carrier

3. used when the project will be entirely designed and implemented by the company’s internal staff.

4. groups that participate in the wireless technology adoption planning process.

5. mostly used for data networking.

6. useful when considering the purchase of products or services needed for a business.

7. opportunity for managers to see the technology in action so that they can begin to understand how it will impact the business.

8. residential and industrial control.

9. central point of contact for users who need assistance using technology.

SHORT ANSWER

1. Briefly describe the advantages of wireless technology in business.

ANS:

2. How can wireless technologies increase an employee productivity?

ANS:

3. Briefly describe the data security and privacy issues faced by wireless technologies.

ANS:

4. What are some of the questions you need to answer when looking at the organization to evaluate the need for wireless technology?

ANS:

5. What are some of the questions you need to answer when assessing the current network?

ANS:

6. Briefly explain how to perform a wireless site survey.

ANS:

7. What are some of the factors regarding the potential implementation of a WLAN identified by a wireless site survey?

ANS:

8. Briefly describe how to develop a plan to implement a wireless technology.

ANS:

9. Why should an organization’s IT team be involved when implementing a wireless technology?

ANS:

10. What are some of the key elements of a request for proposal?

ANS:

CIS 513 Week 5 Midterm Exam – Strayer University NEW

CIS/513 Week 5 Midterm Exam – Strayer NEW

Click On The Link Below To Purchase A+ Graded Material
Instant Download

http://hwgala.com/CIS-513-Midterm-Exam-Week-5-Strayer-NEW-CIS513W5E.htm

 

Chapter 1 Through 4

Chapter 1 – Introduction to Wireless Communications

TRUE/FALSE

1. VoIP phones can carry analog data over the Internet.

2. WirelessHD can transfer video and sound at 7 Gbps and higher.

3. UWB WiGig has a range of up to 100 meters.

4. The ZigBee Alliance protocols enable devices like light switches to communicate with one another.

5. RFID technology is implemented by roadside assistance services to link a vehicle and driver to a central service center.

6. 4G technology uses 100% analog transmission for voice and data.

7. An AP connects wireless devices to the wired LAN.

8. DSL is an Internet access technology that uses cable TV lines to make a network connection.

9. The job market for wireless LAN professionals is saturated and likely to decline in coming years.

10. One advantage of wireless technology is that it is immune to interference sources.

MULTIPLE CHOICE

1. What type of device is built into a tablet computer and can send data over radio waves to another device such as a laser printer?
a. VoIP phone c. access point
b. wireless NIC d. Ethernet NIC

2. How can VoIP over Wi-Fi help save money?
a. by eliminating the need for a phone c. by reducing the cost of a smartphone
b. by saving on cellular phone bills d. by not requiring an access point

3. Where would you most likely find RFID tags around the house?
a. on product packages c. in the plumbing
b. in the walls and ceilings d. on the electrical lines

4. What is the typical range for the use of Bluetooth?
a. meters to kilometers c. inches to feet
b. yards to miles d. millimeters to inches

5. With what technology will you find radio modules and link managers?
a. RFID c. Wi-Fi
b. GPS d. Bluetooth

6. Which technology has a maximum range of about 10 meters, can transmit up to 10 Gbps, and is used to transmit high quality audio and video wirelessly?
a. Wi-Fi c. UWB
b. Bluetooth d. RFID

7. Automatic connections between what type of devices create a piconet?
a. VoIP c. Bluetooth
b. Infrared d. WirelessHD

8. In what type of wireless communication device will you find a repeater?
a. satellite c. antenna
b. NFC d. WNIC

9. What kind of network is built around the concept of low-power transmitters built on towers that can use the same radio frequency channel?
a. Wi-Fi 802.11 networks c. UWB A/V networks
b. cellular telephone networks d. GPS tracking networks

10. What type of cellular network uses 100 percent digital transmission for voice and data and can reach rates up to 150 Mbps?
a. CDMA c. 3G
b. 4G d. GSM

11. What kind of device does a WLAN use to facilitate communication between wireless computers?
a. Ethernet switch c. access point
b. GPS hub d. cell station

12. Which wireless standard provides for data transmission speeds up to 600 Mbps with a range up to 375 feet?
a. 802.11g c. 802.16m
b. WiGig d. 802.11n

13. Which technology uses regular phone lines and transmits at speeds up to 256 Kbps?
a. POTS c. T1
b. ISDN d. cable modem

14. Which communication technology should you use if you need to connect three offices which are all within 3 miles of each other at speeds up to 75 Mbps using antennas?
a. T1 c. WiMax
b. DSL d. ISDN

15. Where are you most likely to find the WAP2 protocol in use?
a. cellular phones c. tablets
b. laptops d. servers

16. What term refers to the combining of voice, video and text-processing and access to multiple network platforms from a single device?
a. access aggregation c. digital convergence
b. digital landscape d. network transparency

COMPLETION

1. Smartphones can use software that allow them to make ______________ phone calls over a wireless LAN instead of the cellular network.

2. Bluetooth communicates using small, low-power ______________ called radio modules.

3. In the future, most barcode functions are likely to be replaced by ___________ tags including for the purpose of inventory management.

4. To protect confidentiality, wireless data can be ______________ between the access point and wireless device, allowing only the recipient to decode the message.

5. The FCC, FDA, and EPA have established ________ exposure safety guidelines to limit the signal absorption rate of wireless device users.

MATCHING

a. 3G f. motes
b. Bluetooth g. T1
c. DSL h. UWB
d. J2ME i. WiGig
e. link manager j. WPAN

1. a wireless standard that enables devices to transmit data at up to 721.2 Kbps
over a typical maximum distance of 33 feet

2. a variation of the Java programming language designed for use in portable devices such as cellular phones

3. a very small network that typically extends to 10 meters or less

4. a technology used to transmit data over special telephone lines at 1.544 Mbps

5. an alliance of companies involved in developing a common wireless specification using the 60 GHz band

6. a technology used to transmit data over a telephone line

7. remote sensors used for collecting data from manufacturing equipment or for
scientific research

8. wireless communications technology that allows devices to transmit data at hundreds of megabits or even gigabits per second at short distances

9. a digital cellular technology that can send data at up to 21 Mbps over the cellular telephone network

10. special software in Bluetooth devices that helps identify other Bluetooth devices

SHORT ANSWER

1. Describe how RFID can enhance a family’s convenience in the kitchen.

2. Describe Bluetooth technology and how it can be used in a computing environment.

3. What is UWB and how might it be used in a home?

4. What is a piconet?

5. What does a repeater do in a satellite communication system?

6. How does a WLAN use an access point?

7. Describe a WMAN and discuss a technology a WMAN might use.

8. What is digital convergence and how might it affect how people use network devices?

9. Discuss the use of wireless technologies in home entertainment.

10. Discuss how radio signal interference can affect wireless devices.

Chapter 2 – Wireless Data Transmission

TRUE/FALSE

1. The ASCII code uses 16 bits to represent 128 different characters.

2. Infrared light interferes with radio signals but is not affected by radio signals.

3. The height of a radio wave is called the amplitude of the wave.

4. Spread-spectrum signals are more susceptible to outside interference than narrow-band transmissions.

5. Hopping codes used in FHSS transmissions are configured on the base station by the network administrator.

MULTIPLE CHOICE

1. Which of the following is true about wireless radio signal transmissions?
a. they travel at the speed of light c. they travel as discrete particles
b. they require an atmosphere to move d. they require visible light

2. Which of the following is NOT true about infrared light?
a. it can be used in directed transmissions c. it is less susceptible to interference from visible light sources
b. it can be used in diffused transmissions d. all infrared signals are invisible

3. Which of the following transmits a signal in an infrared device?
a. diffuser c. detector
b. emitter d. antenna

4. Which of the following is NOT a limitation of using infrared wireless systems?
a. they lack mobility c. someone can eavesdrop from another room
b. they use a line-of-sight principle d. diffused transmissions have a range of 50 feet

5. Which of the following is a good application for an infrared wireless system?
a. stream movies from a server c. whole house wireless network
b. wireless outdoor speakers d. data transfer between laptop and camera

6. Which best describes an analog signal?
a. it starts and stops c. consists of discrete pulses
b. intensity varies and is continuous d. Morse code is an example

7. What process must occur to transmit a digital signal over an analog medium?
a. modulation c. decoding
b. decoupling d. emitting

1

8. The distance between a point in one wave cycle and the same point in the next wave cycle is called which of the following?
a. amplitude c. carrier
b. wavelength d. frequency

9. The frequency of a wave is best defined as which of the following?
a. encoding of bits onto an analog wave c. a carrier wave that has been modulated
b. the voltage difference between the peak and trough of the wave d. the number of times a cycle occurs within one second

10. What is the unit of measurement for radio frequency?
a. volt c. Hz
b. rpm d. amp

3

11. What is the role of an antenna on a wireless device?
a. it receives data c. it serves as a ground signal
b. it demodulates d. it transmits and receives data

12. Which of the following is true about baud rate?
a. only one bit can be transferred per signal unit (baud) c. a baud rate of 2400 always means a bandwidth of 2400 bps
b. multiple bits can be transferred with each signal unit d. multiple signal units are needed to represent each bit

13. Which of the following best describes bandwidth in an analog system?
a. the range of frequencies that can be transmitted by a system c. the number of bytes transmitted per minute
b. the number of bits transmitted per second d. the maximum frequency supported by the medium

14. Which of the following is NOT a type of modulation that can be applied to an analog signal?
a. phase c. frequency
b. carrier d. amplitude

15. Which type of radio signal is most susceptible from interference sources such as lightning?
a. AM c. PM
b. FM d. DM

16. Which of the following is NOT an advantage of digital modulation over analog modulation?
a. better use of bandwidth c. better performance during interference
b. requires less power d. modulation techniques are simpler

17. Which binary signaling technique reduces the voltage to zero during the transmission of a 1 bit before the bit period ends.
a. NRZ-L c. RZ
b. NRZ-I d. NRZ

18. Which binary modulation technique employs NRZ coding such that the absence of a carrier signal represents a 0 bit?
a. ASK c. FSK
b. BPSK d. PSK

19. Which radio transmission method uses a chipping code?
a. FM c. DSSS
b. FHSS d. AM

20. Which of the following is a spread spectrum technique that employs mathematical algorithms to recover lost data bits?
a. frequency hopping c. narrow band
b. direct sequence d. wide band

COMPLETION

1. Data signals in a wireless communication system travel on _______________ waves.

2. A signal that is broadcast as a continuous wave is called a(n) _______________ signal.

3. When representing a wave with a garden hose, the distance between the peaks of the waves represents the ____________.

4. The _______________ non-return-to-zero encoding method represents a 1 bit by increasing voltage to a positive value and a 0 bit by decreasing the voltage to a negative value.

5. In the presence of background interference, receivers can detect a ____________ change more reliably than a frequency or amplitude change.

MATCHING

a. ASCII f. digital modulation
b. amplitude modulation g. frequency modulation
c. analog signal h. hopping code
d. baud rate i. NRZ
e. carrier signal j. PM

1. a method of encoding a digital signal onto an analog carrier wave for transmission over media that does not support direct digital signal transmission

2. the number of times that a carrier signal changes per second

3. a technique that changes the number of wave cycles in response to a change in the amplitude of the input signal

4. a binary signaling technique that increases the voltage to represent a 1 bit but provides no voltage for a 0 bit

5. a technique that changes the height of a carrier wave in response to a change in the height of the input signal

6. a signal of a particular frequency that is modulated to contain either analog or digital data

7. a technique that changes the starting point of a wave cycle in response to a change in the amplitude of the input signal

8. the sequence of changing frequencies used in FHSS

9. a coding scheme that uses the numbers from 0 to 127 to represent alphanumeric characters and symbols

10. a signal in which the intensity (amplitude or voltage) varies continuously and smoothly over a period of time

SHORT ANSWER

1. Describe the components in an infrared wireless system.

2. What are the advantages and limitations of an infrared wireless system?

3. Contrast analog signals with digital signals.

4. Describe how radio transmitters use a carrier signal.

5. How are radio waves transmitted using an antenna?

6. What are the three types of modulation that can be applied to an analog signal to enable it to carry information?

7. Describe amplitude modulation.

8. Describe the NRZ technique of representing bit signals.

9. What is phase shift keying? Describe how it works.

10. How are bits transmitted using DSSS? Include the chipping code in your answer.

Chapter 3 – Radio Frequency Communications

TRUE/FALSE

1. A high-pass filter allows all signals above a minimum threshold to pass through.

2. A mixer separates an input into two or more outputs.

3. TDMA was developed to overcome the problem of crosstalk.

4. A disadvantage of CDMA is that it can only carry one third the amount of data of TDMA.

5. There are no power limits imposed on devices using the unregulated bands.

MULTIPLE CHOICE

1. Which of the following is NOT a common component of all radio systems?
a. filter c. mixer
b. emitter d. antenna

2. Which of the following is a type of RF filter?
a. top-pass c. bandpass
b. mid-pass d. medipass

3. If a low-pass filter is set at 2200 MHz, which of the following signals would be allowed to pass through?
a. 2400 MHz c. 1000 MHz
b. 1500 GHz d. 23000 KHz

4. What kind of signals can result from the process of modulating a signal with data to be transmitted?
a. harmonics c. modulators
b. passbands d. sidebands

5. The sidebands of a frequency carrier are best described as which of the following?
a. the sum of the carrier signal and the highest value of the mixer output c. the average of the high and low values of the input signal
b. the difference between the highest and lowest input frequency d. the sum and difference of the highest input signal and carrier frequency

6. Which type of device is considered active device because it adds power to a signal?
a. mixer c. antenna
b. filter d. amplifier

7. Which of the following would take a transmission band of 1000 Hz and divide it into 100 channels of 10 Hz each to accommodate multiple access?
a. FDMA c. CDMA
b. TDMA d. SDMA

8. Which multiple access method overcomes the problem of crosstalk and divides the transmission time into several slots?
a. SDMA c. TDMA
b. CDMA d. FDMA

9. Which multiple access method uses a spreading code?
a. CDMA c. SDMA
b. TDMA d. FDMA

10. What type of transmission is a broadcast radio station an example of?
a. duplex c. simplex
b. half-simplex d. half-duplex

11. Which type of switching is used in a POTS system?
a. packet switching c. cellular switching
b. circuit switching d. frame switching

12. What can take place when signal strength falls close to or below the level of noise?
a. SNR c. crosstalk
b. interference d. attenuation

13. Objects in the path of a radio signal can cause which of the following?
a. crosstalk c. EMI
b. amplification d. attenuation

14. What is the term for signals that get reflected and travel different paths between transmitter and receiver arrive out of phase?
a. electro-magnetic interference c. multipath distortion
b. reflective attenuation d. phase misalignment

15. What problem can a directional antenna reduce in severity?
a. reflective attenuation c. phase misalignment
b. multipath distortion d. electro-magnetic interference

16. Which type of standard is an official standard controlled by and organization or body open to everyone?
a. de jure standards c. consortia standards
b. de facto standards d. paramount standards

17. Which standards organization functions as a clearinghouse for many types of standards development in the U.S.?
a. ETSI c. ANSI
b. IETF d. ISOC

18. Which standards body deals with user-premises equipment and satellite communications?
a. IAB c. IETF
b. TIA d. ISCO

19. Which international standards organization coordinates global communications networks and services and is actually a treaty organization?
a. IAB c. ISO
b. TIA d. ITU

20. In which frequency band will you find an 802.11 network?
a. medium frequency (MF) c. extremely high frequency (EHF)
b. super high frequency (SHF) d. very high frequency (VHF)

COMPLETION

1. A __________________ filter sets a range of frequencies that include a minimum and maximum threshold.

2. _________________ uses direct sequence spread spectrum technology.

3. ____________________ transmission is typically used in consumer devices such as CB radios or walkie talkies where you have to hold down a button while speaking.

4. A technique called ______________ array processing replaces a traditional antenna

5. _______________ transmission uses low-power, precisely timed pulses of energy that operate in the same frequency spectrum as low-end noise and is used in WiGig.

MATCHING

a. circuit switching f. license exempt spectrum
b. directional antenna g. packet switching
c. full-duplex transmission h. signal-to-noise ratio
d. half-duplex transmission i. simplex transmission
e. harmonics j. switching

1. transmission that occurs in both directions but only one way at a time

2. a switching technique in which a dedicated and direct physical connection is made between two transmitting devices

3. transmission that occurs in only one direction

4. unregulated radio frequency bands that are available in the United States to any users without a license

5. transmissions in which data flows in either direction simultaneously

6. moving a signal from one wire or frequency to another

7. data transmission that is broken into smaller units

8. an antenna that radiates the electromagnetic waves in one direction only

9. stray oscillations that result from the process of modulating a wave and that
fall outside the range of frequencies used for transmission

10. the measure of signal strength relative to the background noise

SHORT ANSWER

1. What does a filter do and why is one needed in a radio system?

2. List the three types of RF filters.

3. Why are filters found in transmitters?

4. What is the purpose of a mixer? Include a discussion of sidebands in your answer.

5. What is an amplifier and why is it a crucial component in a radio system?

6. Describe time division multiple access.

7. What are two advantages that TDMA has over FDMA?

8. What are three advantages of CDMA over TDMA?

9. What advantages does packet switching have over circuit switching for transmitting data?

10. What is multipath distortion?

Chapter 4 – How Antennas Work

TRUE/FALSE

1. Cables and connectors offer resistance to the flow of electricity, increasing the power of a signal.

2. Decibels are an absolute measurement of signal strength, making it simpler to calculate gain or loss.

3. The size of an antenna is directly proportional to the wavelength of the signal it is designed to transmit and receive.

4. A monopole antenna is a type of two-dimensional antenna.

5. Point-to-point wireless links are best served by using omnidirectional antennas.

MULTIPLE CHOICE

1. Which of the following is likely to result in a wireless signal gain?
a. cables c. connectors
b. amplifier d. atmosphere

2. What unit of measurement is a ratio between two signal levels?
a. volt c. decibel
b. watt d. ohm

3. Which value indicates the signal being measured is twice the power?
a. +3 dB c. +5 mW
b. -5 dB d. -3 mW

4. If a signal is represented as 15 mW + 10 db, what is the resulting signal strength in mW?
a. 30 mW c. 75 mW
b. 25 mW d. 150 mW

5. Which of the following refers to the gain an antenna has over a dipole antenna at the same frequency?
a. dBm c. dBi
b. dBd d. dBg

6. Which of the following is true about antennas?
a. the size is proportional to the wavelength c. most are active devices
b. lower frequency signals require larger antennas d. omnidirectional types provide the best directional gain

7. Which of the following is true about omnidirectional antennas?
a. they work best in point-to-point links c. longer ones usually have higher gain
b. they cannot be used in 802.11 applications d. they emit a signal in three dimensions

8. Which type of directional antenna is used for outdoor applications up to 16 miles?
a. cellular c. parabolic dish
b. patch d. yagi

9. A cellular phone antenna that is 13 inches long would be considered which of the following?
a. eighth-wave c. half-wave
b. quarter-wave d. full-wave

10. If an antenna is much longer than the wavelength, what is the typical result?
a. inefficient delivery of RF energy c. wrong signal frequency
b. signals that are an incorrect wavelength d. no signal is transmitted

11. What does antenna polarization determine about the performance of the antenna?
a. radiation pattern c. measurement of signals is positive or negative voltage
b. horizontal or vertical orientation d. direction of the signal

12. What type of antenna is a straight piece of wire with no reflecting ground element?
a. monopole c. horn
b. dipole d. dish

13. Which type of antenna is two-dimensional, is common in telephone networks, and is used to transmit high-power microwave signals between towers?
a. patch c. horn
b. satellite dish d. dipole

14. What type of antenna is divided into a matrix of radiating elements and are used in modern radar systems?
a. switched beam c. patch
b. horn d. phased array

15. When a coaxial cable connects the antenna to the transmitter, what property of the cable must match that of the antenna?
a. impedance c. length
b. thickness d. inductance

16. What type of wave propagation do RF signals transmitted at 50 MHz have?
a. ground waves c. line-of-sight waves
b. sky waves d. atmospheric waves

17. Which type of antenna should usually be used at the central location in a point-to-multipoint wireless link?
a. unidirectional c. directional
b. omnidirectional d. semi-directional

18. Which of the following is the elliptical region within which signals travel between two antennas in a point-to-point link?
a. troposphere radius c. Fresnel zone
b. propagation limit d. wave pattern

19. What is the signal strength necessary to meet a receiver’s minimum requirements?
a. transmission path c. minimum wavelength
b. Fresnel zone d. link budget

20. What is the maximum percent of the Fresnel zone that can be blocked by obstructions in a point-to-point link?
a. 20% c. 40%
b. 60% d. 10%

COMPLETION

1. ______________ is the effect of an amplifier boosting the power of a signal.

2. A radio signal’s power does not change in a linear fashion, but instead changes ______________.

3. _____________ is a relative measurement used to represent gain or loss in a signal.

4. When considering antenna size, lower frequencies require ___________ antennas.

5. A _________________ analyzer is a tool that displays the signal amplitude and frequency of a radio transmission.

MATCHING

a. antenna pattern f. ground-plane
b. dB isotropic g. isotropic radiator
c. dBm h. passive antenna
d. dipole i. patch antenna
e. free space loss j. smart antenna

1. the signal loss that occurs as a result of the tendency of RF waves to spread

2. a theoretically perfect sphere that radiates power equally in all directions

3. the relative measurement of the gain of an antenna when compared to a theoretical isotropic radiator

4. a new type of antenna that uses a signal processor and an array of narrow beam elements

5. a graphic that shows how a signal radiates out of an antenna

6. a semi-directional antenna that emits a wide horizontal beam and an even
wider vertical beam

7. a metal disc or two straight wires assembled at 90 degrees, used to provide
a reflection point for monopole antennas

8. a relative way to indicate an absolute power level in the linear watt scale

9. can only radiate a signal with the same amount of energy that appears at the antenna connector

10. an antenna that has a fixed amount of gain over that of an isotropic radiator

SHORT ANSWER

1. List three of the four aspects of RF signal transmission you need to know.

2. Describe the “tens and threes of RF mathematics”.

3. What is an isotropic radiator?

4. Describe directional gain and how it can be accomplished with a passive antenna.

5. What are two types of directional antenna? Describe them.

6. What is free space loss? Describe how it occurs.

7. How does the size of an antenna affect its ability to transmit and receive?

8. What does an antenna pattern show about the RF wave?

9. What does antenna polarization tell you about the antenna wave? How is it important for signal reception?

10. Give two examples of two-dimensional antennas. Describe them.