Guide To Wireless Communications 4th Edition Olenewa Test Bank

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Guide to Wireless Communications 4th

Edition olenewa Test Bank


Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/guide-to-wireless-communications-4th-edition-olenewa-test-bank/
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


1. WPAN technologies are designed to connect devices that are typically up to 10 meters apart.
a. True
b. False
ANSWER: True

2. One of the advantages of WPAN technologies is their conservative use of battery power.
a. True
b. False
ANSWER: True

3. The first step in the Bluetooth pairing process is the paging procedure.
a. True
b. False
ANSWER: False

4. On a ZigBee network, a reduced-function device can only connect to one full-function device on the network.
a. True
b. False
ANSWER: True

5. Bluetooth uses a challenge-response strategy for device authentication.


a. True
b. False
ANSWER: True

6. Which of the following is NOT a likely application for WPAN technologies?


a. home control systems
b. HD video streaming
c. industrial control systems
d. security systems
ANSWER: b

7. Which of the following is true about WPAN standards?


a. IEEE developed standards for protocols above layer 2
b. industry alliances developed specifications for layers 1 and 2
c. IEEE 802.15.1 is the Bluetooth standard
d. 802.16n is the ZigBee standard
ANSWER: c

8. Which of the following is true about the OSI model and IEEE 802?
a. the PMD is part of the Data Link layer
b. the PLCP formats data received from the MAC
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


c. the LLC is part of the Physical layer
d. the MAC layer is responsible for establishing connectivity to the local network
ANSWER: b

9. Which radio frequency band does Bluetooth use?


a. 2.4 GHz ISM
b. 5.0 GHz ISM
c. 2.0 GHz ISM
d. 4.2 GHz ISM
ANSWER: a

10. Which of the following is true about the Bluetooth protocol stack?
a. the L2CAP sits between Baseband and RF
b. the Baseband layer lies on top of the RF layer
c. Link Manager communicates directly with the Physical Radio
d. The RF layer communicates between the Link Manager and L2CAP
ANSWER: b

11. What feature available in some Bluetooth devices increases data rates to 2.1 or 3 Mbps?
a. Link Manager
b. radio module
c. L2CAP
d. EDR
ANSWER: d

12. Which Bluetooth power class allows transmission ranges up to 330 feet?
a. Power Class 1
b. Power Class 2
c. Power Class 3
d. Power Class 4
ANSWER: a

13. Bluetooth 1.x uses a variation of which modulation technique?


a. PSK
b. ASK
c. FSK
d. GSK
ANSWER: c

14. What feature of Bluetooth version 3.0 uses a separate radio module that transmits using similar methods to
Wi-Fi?
a. BLE
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


b. ULP
c. AMP
d. NFC
ANSWER: c

15. Which transmission technique is used by Bluetooth devices?


a. Narrowband
b. FHSS
c. DHSS
d. UWB
ANSWER: b

16. Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a
minimum of interference?
a. adaptive frequency hopping
b. frequency hopping spread spectrum
c. alternate MAC/PHY
d. Bluetooth low energy
ANSWER: a

17. What is created when a Bluetooth network has one master and at least one slave using the same channel?
a. scatternet
b. wi-fi net
c. piconet
d. bluenet
ANSWER: c

18. What type of physical Bluetooth link carries voice transmissions up to 64 Kbs and is used for a full-duplex
connection such as when using a headset to make a phone call?
a. FEC
b. ACL
c. eSCO
d. SCO
ANSWER: d

19. Which of the following is NOT a field in a Bluetooth frame?


a. Access code
b. Frame check sequence
c. Header
d. Payload
ANSWER: b

Copyright Cengage Learning. Powered by Cognero. Page 3


Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


20. Which of the following is NOT a Bluetooth error correction scheme?
a. 1/3 rate FEC
b. 2/3 rate FEC
c. ARQ
d. CRC
ANSWER: d

21. In which Bluetooth power mode is only the slave device's internal timer running?
a. active mode
b. sniff mode
c. hold mode
d. park mode
ANSWER: c

22. Which of the following is true about the ZigBee standard?


a. designed to support mesh networking
b. replaced an existing global, open standard
c. used for larger data transfers than Bluetooth
d. operates in the 5.0 and 6.5 GHz ISM bands
ANSWER: a

23. Which layer in a ZigBee device is responsible for detecting the presence of an RF signal in the currently
selected channel?
a. LLC
b. PHY
c. MAC
d. Upper
ANSWER: b

24. Which task is the MAC layer responsible for in an 802.15.4 device?
a. turning the radio transceiver on and off
b. analyzing link quality
c. association and disassociation
d. selecting a frequency channel for operation
ANSWER: c

25. Which type of ZigBee device controls the network in a star topology?
a. all end-node devices
b. reduced function device
c. full-function device
d. PAN coordinator
Copyright Cengage Learning. Powered by Cognero. Page 4
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


ANSWER: d

26. Which of the following is an 802.15.4-based technology that implements IPv6 on WPANs and supports
mesh networking?
a. WiGig
b. UWB
c. 6LoWPAN
d. WirelessHART
ANSWER: c

27. Which 802.15.4 technology is designed for industrial-automation applications such as process control,
equipment and process monitoring, and advanced diagnostics in wired networks?
a. WiGig
b. UWB
c. 6LoWPAN
d. WirelessHART
ANSWER: d

28. Which of the following is a private company that verifies the authenticity of each user in order to discourage
fraud?
a. PKI
b. certificate authority
c. message integrity organization
d. LLC
ANSWER: b

29. In which Bluetooth encryption mode is all traffic encrypted?


a. Encryption Mode 1
b. Encryption Mode 2
c. Encryption Mode 3
d. Encryption Mode 4
ANSWER: c

30. What is the purpose of a MIC in IEEE 802.15.4?


a. provides frame integrity
b. provides data encryption
c. authenticates users
d. performs access control
ANSWER: a

31. What are the three types of addresses used in a Bluetooth piconet? Describe each.
ANSWER: Bluetooth device address - Unique 48-bit number (IEEE 802 hardware or MAC address), which is
Copyright Cengage Learning. Powered by Cognero. Page 5
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


preconfigured in the hardware
Active member address - 3-bit number valid only as long as device is an active slave in a piconet
Parked member address - 8-bit number valid only as long as device is a parked slave; a parked device does not
retain the 3-bit active member address

32. Describe the two types of physical links between Bluetooth devices.
ANSWER: A synchronous connection-oriented (SCO) link is a symmetric point-to-point link between a master and a
single slave. This link functions like a circuit-switched link by using reserved time slots at fixed intervals. A
master and slave can each support up to three simultaneous SCO links. A SCO link carries mainly voice
transmissions at a speed of 64 Kbps. These transmissions occur in both directions.
An extended synchronous connection-oriented link (eSCO) link is similar to a SCO link. It is also
bidirectional, but can be symmetric or asymmetric (different data rates for master to slave and slave to master),
and is used for point-to-point, constant rate data, but with limited retransmissions in case errors should happen.
An asynchronous connectionless (ACL) link is a packet-switched link used for data transmissions. Sometimes
called a point-to-multipoint link, the ACL link is from one master to all the slaves participating on the piconet.
A piconet can support only a single ACL link between one master and up to seven slaves. In the time slots not
reserved for the SCO links, the master can establish an ACL and transfer data to any slave. A slave already
engaged in an SCO link can also have an ACL link.

33. What are the two types of network access used in IEEE 802.15.4 networks? Describe them.
ANSWER: There are two types of network access used in IEEE 802.15.4: Beacon-enabled networks in which the frames
contain contention-based periods for network access and may contain contention-free periods called
guaranteed time slots (GTSs), which are used for data transfer to specific devices. Beacons are a special type
of frame transmitted by the coordinator only in star topology networks, or transmitted by routers to other
devices, on request from a child device.
In contention-based communications, all devices that want to transmit in a particular frequency use CSMA/CA
to determine if the channel is busy. In beacon-enabled networks, the PAN coordinator can transmit control
information about which devices are allowed to transmit and when, and it will also inform devices about
timing periods in which all devices can contend for access to the medium. Beacons can be transmitted at fixed
intervals, during which devices will normally wake-up and turn on their receivers so they can find out if any
messages are being held for them at the coordinator or a parent device.

34. List three of the seven tasks the 802.15.4 MAC layer is responsible for.
ANSWER: Generating time synchronization frames if the device is a PAN coordinator
Synchronizing to the time synchronization frames
Association and disassociation
Device security and support of security mechanisms implemented by the upper layers
Managing channel access
Giving priority for certain devices to transmit at specific times
Maintaining a reliable link (error detection); 802.15.4 uses a 16-bit ITU cyclic redundancy check for
validating the data

35. What are the four levels of addresses for identifying devices within a ZigBee PAN?
ANSWER: The ZigBee specification defines four levels of addresses for identifying devices within a PAN: IEEE address,
network (PAN) address, node address, and endpoint address.

36. What is a cluster tree topology and how do they compare to mesh networks?
ANSWER: Cluster tree topologies are made up of two or more tree topology networks that are interconnected by FFDs.
Cluster tree networks have a slight advantage over mesh networks. In a mesh network, performance is
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


diminished because each full-function node must maintain a complete routing table and make decisions on the
best route to use when forwarding the packets. However, the reliability of a cluster tree network is not as high
as that of a mesh network, because the failure of an interconnecting device can prevent an entire tree from
communicating with other trees and other devices on the network, perhaps preventing a light switch from
turning on a lamp located at the other end of the room or building.

37. How is power management implemented in a ZigBee network?


ANSWER: Packet routing requires a lot of processing overhead and some additional traffic, which diminishes the power-
saving effect of ZigBee devices and also reduces the data throughput. In addition, ZigBee devices are designed
to be very small-such as a light switch-and for this reason they are more likely to be equipped with low-speed,
power-efficient CPUs. In a ZigBee PAN, only the devices that perform routing or are coordinators incur
overhead and, consequently, consume more power. The 802.15.4 standard favors battery-powered devices but
does not prevent devices from being connected to another power source, such as an electrical outlet. There is
also no limitation on devices having additional data-processing power. Most FFDs, which are routing capable
ZigBee devices, typically connect to external power sources, although they can run on battery power during
outages. One example is an FFD that includes a temperature sensor and is configured to transmit every 30
seconds, such as those monitoring critical machinery.

38. Describe the WirelessHART technology.


ANSWER: The Highway Addressable Remote Transducer (HART) protocol was designed for industrial-automation
applications in wired networks-process control, equipment and process monitoring, and advanced diagnostics,
for example. HART supports both a bus topology, in which several instruments are attached to the same cable,
and a point-to-point connection that allows both digital and analog signals to be sent on the same cable. In
2007, the HART Communications Foundation (HCF) approved WirelessHART to protect manufacturing
companies' investment in the over 30 million HART devices installed while permitting their use over a
wireless link.

39. List and describe the three levels of Bluetooth security.


ANSWER: There are three levels of Bluetooth security:
* Level 1: No security-A Bluetooth device does not initiate any security steps.
* Level 2: Service-level security-Security is established at the higher levels of the protocol stack after a
connection is made.
* Level 3: Link-level security-Security is established at the lower levels of the protocol stack before a
connection is made.

40. What is the process that ZigBee WPANs use for authentication and encryption? Describe how it works.
ANSWER: ZigBee WPANs use a process called symmetric key for both authentication and encryption. A symmetric key
is a sequence of numbers and letters, much like a password, that must be entered by the authorized user on all
devices. No automatic key distribution or key rotation is included in the standard, although these options can
be implemented at the higher protocol layers. The length of the key can be 4, 6, 8, 12, 14, or 16 octets, with
longer keys providing more security than shorter ones.

Match each item with a statement below.


a. AFH
b. AMP
c. ARQ
d. binding
e. GTS
Copyright Cengage Learning. Powered by Cognero. Page 7
Name: Class: Date:

Chapter 5 - Wireless Personal Area Networks


f. inquiry procedure
g. MIC
h. LLC
i. sequential freshness
j. superframe

41. allows the master in a piconet to change the hopping sequence


ANSWER: a

42. makes it possible for Bluetooth radio manufacturers to add a second radio that uses 802.11
ANSWER: b

43. An error-correction scheme that continuously retransmits until an acknowledgment is received


ANSWER: c

44. process of establishing a relationship between endpoints in a ZigBee network


ANSWER: d

45. reserved period for critical devices to transmit priority data


ANSWER: e

46. process that enables a Bluetooth device to discover which other Bluetooth devices are in range
ANSWER: f

47. a code composed of a subset of the data, the length of the data, and the symmetric key
ANSWER: g

48. a sublayer of the IEEE Project 802 data link layer


ANSWER: h

49. a security service available in 802.15.4


ANSWER: i

50. a mechanism for managing transmissions in a piconet


ANSWER: j

Copyright Cengage Learning. Powered by Cognero. Page 8

You might also like