Ans : 1. WLAN is outwardly looking while WPAN is inwardly looking 2. WLAN interacts with wired infrastructure while WPAn interacts with personal objects. 3. In WLAN timeframe is hours to days while in WPAN timeframe is seconds to hours. 4.WLAN has portable devices while WPAN has highly mobile devices. 5.In WLAN wires are expensive and in WPAN wires get in the way. Source: Session 2, Slide 17 2) Which of the following is not true? Adhoc Wireless networks a. have mobile nodes b. have connections which are dynamic in nature c. have nodes that cannot exist independent of each other d. have connections that are not fixed Ans : c. Source: Session 2, Slide 4 3) What is the significance of IEEE 802.11a and IEEE 802.11b? Ans :IEEE 802.11a is an orthogonal frequency division multiplexing radio in 5GHz band IEEE 802.11b is an extension to the DSSS Phy in the 2.4 GHz band, delivering up to 11 Mbps data rate. Source: Session 2, Slide 14 4) Bluetooth does not fit one of the below descriptions: a. A wireless technology for long range wireless connectivity b. A global specification c. A technology that provides freedom from wired connection d. Revolutionizes personal connectivity Ans:a. Source: Session 2, Slide 53 5) What is Piconet? Ans: A Piconet is a collection of devices connected via Bluetooth technology in an adhoc fashion. Source: Session 3 , Slide 79
6) Parked Units refer to devices in a Scatternet, which do not have MAC
address but are synchronized. T/F Ans: F Source : Session 3, Slide 84 7) Which of the following is not true? A SCO link is a. A point to multipoint link b. It is between a master and a single slave in the piconet c. The master can support up to 3 SCO links to the same slave. d. A slave supports 2 SCO links if the links are from different masters and 3 if from the same master. Ans:a. Source:Session 4, Slide 7 8) In the Connection-Sniff state devices synchronized to the Pico net can enter power saving mode and hence it is most power efficient. T/F Ans: F Source : Session 4, Slide 40 9) What is the need for Bluetooth Security Ans: 1. Bluetooth signals can be easily intercepted, so built-in security to discourage eavesdropping and attempts to falsify the origin of messages (spoofing). 2. Authentication prevents spoofing. 3. Encryption protects link privacy. Source: Session 5, Slide 27 10) Which of the following is not an aim of BlueRF ? a. define data transfer protocols and programming model b. integrate RF and baseband functions c. support protocol super sets d. agree on an industry standard Bluetooth RF trnsceiver tobaseband interface Ans:b. Source: Session 5, Slide 87