Professional Documents
Culture Documents
MC QB Ia2
MC QB Ia2
Module 4 (7marks)
1. What is Bluetooth? Demonstrate the architecture of Bluetooth along
with its advantages and disadvantages.
Answer-
1. Bluetooth simply follows the principle of transmitting and receiving data
using radio waves.
2. It can be paired with the other device which has also Bluetooth but it should
be within the estimated communication range to connect.
3. When two devices start to share data, they form a network called piconet and
a group of interconnected piconets is called a scatternet.
4. The spreading method that it uses is FHSS (Frequency-hopping unfold
spectrum).
Key Features of Bluetooth
• The transmission capacity of Bluetooth is 720 kbps.
• Bluetooth is a wireless device.
• Bluetooth is a Low-cost and short-distance radio communications
standard.
• Bluetooth is robust and flexible.
• The basic architecture unit of Bluetooth is a piconet.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of networks:
Piconet:
1. Piconet is a type of Bluetooth network that contains one primary node called
the master node and seven active secondary nodes called slave nodes.
2. Thus, we can say that there is a total of 8 active nodes which are present at a
distance of 10 meters.
3.The communication between the primary and secondary nodes can be one-to-
one or one-to-many.
4.Possible communication is only between the master and slave; Slave-slave
communication is not possible.
5.It also has 255 parked nodes, these are secondary nodes and cannot take
participation in communication unless it gets converted to the active state.
Scatternet:
Infrastructure Network:
1. In an infrastructure WLAN, communication between wireless devices (like
laptops, smartphones, tablets) occurs through a central hub called an access
point (AP) or router.
2. The access point acts as a bridge between wireless devices and the wired
network, facilitating communication and providing internet access.
3. Typically, infrastructure networks are used in settings where continuous
internet connectivity and centralized management are required, such as offices,
homes, or public spaces like airports and cafes.
4. Security measures like encryption and authentication are often implemented
to secure the network.
Ad-hoc Network:
1. In contrast, an ad-hoc WLAN, also known as a peer-to-peer or Independent
Basic Service Set (IBSS) network, does not rely on a central access point.
2. Devices in an ad-hoc network communicate directly with each other, forming
a decentralized network without the need for any infrastructure.
3. Ad-hoc networks are useful in scenarios where establishing infrastructure is
impractical or unnecessary, such as temporary gatherings, emergency situations,
or peer-to-peer file sharing between devices.
4. However, ad-hoc networks generally lack the robustness, scalability, and
security features of infrastructure networks. Security mechanisms need to be
implemented separately, and the network can be more vulnerable to
unauthorized access.
2. Explain in short the motive of voice over LTE. Also analyze how LTE is
evolved from UMTS
Answer-
Voice over LTE (VoLTE) aims to improve the quality and efficiency of voice
calls by transmitting them over LTE networks, which are designed primarily for
data transmission.
Motive of Voice over LTE (VoLTE):
Traditional voice calls are primarily carried over circuit-switched networks,
which use a dedicated portion of the network bandwidth for each call. However,
LTE networks are optimized for packet-switched data transmission, offering
higher data speeds and more efficient use of spectrum.
VoLTE aims to leverage the benefits of LTE networks to provide high-quality
voice calls over the same IP-based network used for data services. By
transmitting voice calls as data packets, VoLTE can offer improved call quality,
faster call setup times, and support for advanced features such as HD voice and
simultaneous voice and data transmission.