Sie sind auf Seite 1von 2

EETS 8392- 10 Sample Questions

Durgadevi Santhakumar

1) Differentiate between WLAN and WPAN


Ans :
1. WLAN is outwardly looking while WPAN is inwardly looking
2. WLAN interacts with wired infrastructure while WPAn interacts with
personal objects.
3. In WLAN timeframe is hours to days while in WPAN timeframe is seconds to
hours.
4.WLAN has portable devices while WPAN has highly mobile devices.
5.In WLAN wires are expensive and in WPAN wires get in the way.
Source: Session 2, Slide 17
2) Which of the following is not true?
Adhoc Wireless networks
a. have mobile nodes
b. have connections which are dynamic in nature
c. have nodes that cannot exist independent of each other
d. have connections that are not fixed
Ans : c.
Source: Session 2, Slide 4
3) What is the significance of IEEE 802.11a and IEEE 802.11b?
Ans :IEEE 802.11a is an orthogonal frequency division multiplexing radio in
5GHz band
IEEE 802.11b is an extension to the DSSS Phy in the 2.4 GHz band, delivering
up to 11 Mbps data rate.
Source: Session 2, Slide 14
4) Bluetooth does not fit one of the below descriptions:
a. A wireless technology for long range wireless connectivity
b. A global specification
c. A technology that provides freedom from wired connection
d. Revolutionizes personal connectivity
Ans:a.
Source: Session 2, Slide 53
5) What is Piconet?
Ans: A Piconet is a collection of devices connected via Bluetooth technology in an
adhoc fashion.
Source: Session 3 , Slide 79

6) Parked Units refer to devices in a Scatternet, which do not have MAC


address but are synchronized. T/F
Ans: F
Source : Session 3, Slide 84
7) Which of the following is not true?
A SCO link is
a. A point to multipoint link
b. It is between a master and a single slave in the piconet
c. The master can support up to 3 SCO links to the same slave.
d. A slave supports 2 SCO links if the links are from different masters
and 3 if from the same master.
Ans:a.
Source:Session 4, Slide 7
8) In the Connection-Sniff state devices synchronized to the Pico net can enter
power saving mode and hence it is most power efficient. T/F
Ans: F
Source : Session 4, Slide 40
9) What is the need for Bluetooth Security
Ans: 1. Bluetooth signals can be easily intercepted, so built-in security to
discourage eavesdropping and attempts to falsify the origin of messages
(spoofing).
2. Authentication prevents spoofing.
3. Encryption protects link privacy.
Source: Session 5, Slide 27
10) Which of the following is not an aim of BlueRF ?
a. define data transfer protocols and programming model
b. integrate RF and baseband functions
c. support protocol super sets
d. agree on an industry standard Bluetooth RF trnsceiver tobaseband interface
Ans:b.
Source: Session 5, Slide 87

Das könnte Ihnen auch gefallen