Professional Documents
Culture Documents
Guide To Wireless Communications 4th Edition Olenewa Test Bank
Guide To Wireless Communications 4th Edition Olenewa Test Bank
Guide To Wireless Communications 4th Edition Olenewa Test Bank
2. One of the advantages of WPAN technologies is their conservative use of battery power.
a. True
b. False
ANSWER: True
3. The first step in the Bluetooth pairing process is the paging procedure.
a. True
b. False
ANSWER: False
4. On a ZigBee network, a reduced-function device can only connect to one full-function device on the network.
a. True
b. False
ANSWER: True
8. Which of the following is true about the OSI model and IEEE 802?
a. the PMD is part of the Data Link layer
b. the PLCP formats data received from the MAC
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:
10. Which of the following is true about the Bluetooth protocol stack?
a. the L2CAP sits between Baseband and RF
b. the Baseband layer lies on top of the RF layer
c. Link Manager communicates directly with the Physical Radio
d. The RF layer communicates between the Link Manager and L2CAP
ANSWER: b
11. What feature available in some Bluetooth devices increases data rates to 2.1 or 3 Mbps?
a. Link Manager
b. radio module
c. L2CAP
d. EDR
ANSWER: d
12. Which Bluetooth power class allows transmission ranges up to 330 feet?
a. Power Class 1
b. Power Class 2
c. Power Class 3
d. Power Class 4
ANSWER: a
14. What feature of Bluetooth version 3.0 uses a separate radio module that transmits using similar methods to
Wi-Fi?
a. BLE
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:
16. Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a
minimum of interference?
a. adaptive frequency hopping
b. frequency hopping spread spectrum
c. alternate MAC/PHY
d. Bluetooth low energy
ANSWER: a
17. What is created when a Bluetooth network has one master and at least one slave using the same channel?
a. scatternet
b. wi-fi net
c. piconet
d. bluenet
ANSWER: c
18. What type of physical Bluetooth link carries voice transmissions up to 64 Kbs and is used for a full-duplex
connection such as when using a headset to make a phone call?
a. FEC
b. ACL
c. eSCO
d. SCO
ANSWER: d
21. In which Bluetooth power mode is only the slave device's internal timer running?
a. active mode
b. sniff mode
c. hold mode
d. park mode
ANSWER: c
23. Which layer in a ZigBee device is responsible for detecting the presence of an RF signal in the currently
selected channel?
a. LLC
b. PHY
c. MAC
d. Upper
ANSWER: b
24. Which task is the MAC layer responsible for in an 802.15.4 device?
a. turning the radio transceiver on and off
b. analyzing link quality
c. association and disassociation
d. selecting a frequency channel for operation
ANSWER: c
25. Which type of ZigBee device controls the network in a star topology?
a. all end-node devices
b. reduced function device
c. full-function device
d. PAN coordinator
Copyright Cengage Learning. Powered by Cognero. Page 4
Name: Class: Date:
26. Which of the following is an 802.15.4-based technology that implements IPv6 on WPANs and supports
mesh networking?
a. WiGig
b. UWB
c. 6LoWPAN
d. WirelessHART
ANSWER: c
27. Which 802.15.4 technology is designed for industrial-automation applications such as process control,
equipment and process monitoring, and advanced diagnostics in wired networks?
a. WiGig
b. UWB
c. 6LoWPAN
d. WirelessHART
ANSWER: d
28. Which of the following is a private company that verifies the authenticity of each user in order to discourage
fraud?
a. PKI
b. certificate authority
c. message integrity organization
d. LLC
ANSWER: b
31. What are the three types of addresses used in a Bluetooth piconet? Describe each.
ANSWER: Bluetooth device address - Unique 48-bit number (IEEE 802 hardware or MAC address), which is
Copyright Cengage Learning. Powered by Cognero. Page 5
Name: Class: Date:
32. Describe the two types of physical links between Bluetooth devices.
ANSWER: A synchronous connection-oriented (SCO) link is a symmetric point-to-point link between a master and a
single slave. This link functions like a circuit-switched link by using reserved time slots at fixed intervals. A
master and slave can each support up to three simultaneous SCO links. A SCO link carries mainly voice
transmissions at a speed of 64 Kbps. These transmissions occur in both directions.
An extended synchronous connection-oriented link (eSCO) link is similar to a SCO link. It is also
bidirectional, but can be symmetric or asymmetric (different data rates for master to slave and slave to master),
and is used for point-to-point, constant rate data, but with limited retransmissions in case errors should happen.
An asynchronous connectionless (ACL) link is a packet-switched link used for data transmissions. Sometimes
called a point-to-multipoint link, the ACL link is from one master to all the slaves participating on the piconet.
A piconet can support only a single ACL link between one master and up to seven slaves. In the time slots not
reserved for the SCO links, the master can establish an ACL and transfer data to any slave. A slave already
engaged in an SCO link can also have an ACL link.
33. What are the two types of network access used in IEEE 802.15.4 networks? Describe them.
ANSWER: There are two types of network access used in IEEE 802.15.4: Beacon-enabled networks in which the frames
contain contention-based periods for network access and may contain contention-free periods called
guaranteed time slots (GTSs), which are used for data transfer to specific devices. Beacons are a special type
of frame transmitted by the coordinator only in star topology networks, or transmitted by routers to other
devices, on request from a child device.
In contention-based communications, all devices that want to transmit in a particular frequency use CSMA/CA
to determine if the channel is busy. In beacon-enabled networks, the PAN coordinator can transmit control
information about which devices are allowed to transmit and when, and it will also inform devices about
timing periods in which all devices can contend for access to the medium. Beacons can be transmitted at fixed
intervals, during which devices will normally wake-up and turn on their receivers so they can find out if any
messages are being held for them at the coordinator or a parent device.
34. List three of the seven tasks the 802.15.4 MAC layer is responsible for.
ANSWER: Generating time synchronization frames if the device is a PAN coordinator
Synchronizing to the time synchronization frames
Association and disassociation
Device security and support of security mechanisms implemented by the upper layers
Managing channel access
Giving priority for certain devices to transmit at specific times
Maintaining a reliable link (error detection); 802.15.4 uses a 16-bit ITU cyclic redundancy check for
validating the data
35. What are the four levels of addresses for identifying devices within a ZigBee PAN?
ANSWER: The ZigBee specification defines four levels of addresses for identifying devices within a PAN: IEEE address,
network (PAN) address, node address, and endpoint address.
36. What is a cluster tree topology and how do they compare to mesh networks?
ANSWER: Cluster tree topologies are made up of two or more tree topology networks that are interconnected by FFDs.
Cluster tree networks have a slight advantage over mesh networks. In a mesh network, performance is
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:
40. What is the process that ZigBee WPANs use for authentication and encryption? Describe how it works.
ANSWER: ZigBee WPANs use a process called symmetric key for both authentication and encryption. A symmetric key
is a sequence of numbers and letters, much like a password, that must be entered by the authorized user on all
devices. No automatic key distribution or key rotation is included in the standard, although these options can
be implemented at the higher protocol layers. The length of the key can be 4, 6, 8, 12, 14, or 16 octets, with
longer keys providing more security than shorter ones.
42. makes it possible for Bluetooth radio manufacturers to add a second radio that uses 802.11
ANSWER: b
46. process that enables a Bluetooth device to discover which other Bluetooth devices are in range
ANSWER: f
47. a code composed of a subset of the data, the length of the data, and the symmetric key
ANSWER: g