Thursday, 8 December 2016

CIS 513 Week 11 Final Exam – Strayer New


Click On The Link Below To Purchase A+ Graded Material
Instant Download


Chapters 5 Through 8

Chapter 5 - Wireless Personal Area Networks

TRUE/FALSE

     1.   WPAN technologies are designed to connect devices that are typically up to 10 meters apart.


     2.   One of the advantages of WPAN technologies is their conservative use of battery power.


     3.   The first step in the Bluetooth pairing process is the paging procedure.


     4.   A reduced-function device can only connect to one full-function device on the network.


     5.   Bluetooth uses a challenge-response strategy for device authentication.


MULTIPLE CHOICE

     1.   Which of the following is NOT a likely application for WPAN technologies?
a.
home control systems
c.
industrial control systems
b.
video streaming
d.
security systems



     2.   Which of the following is true about WPAN standards?
a.
IEEE developed standards for protocols above layer 2
c.
IEEE 802.15.1 is the Bluetooth standard
b.
industry alliances developed specifications for layers 1 and 2
d.
802.16n is the ZigBee standard



     3.   Which of the following is true about the OSI model and IEEE 802?
a.
the PMD is part of the Data Link layer
c.
the LLC is part of the Physical layer
b.
the PLCP formats data received from the MAC
d.
the MAC layer is responsible for establishing connectivity to the local network



     4.   Which radio frequency band does Bluetooth use?
a.
2.4 GHz ISM
c.
2.0 GHz ISM
b.
5.0 GHz ISM
d.
4.2 GHz ISM



     5.   Which of the following is true about the Bluetooth protocol stack?
a.
the L2CAP sits between Baseband and RF
c.
Link Manager communicates directly with the Physical Radio
b.
the Baseband layer sits atop the RF layer
d.
The RF layer communicates between the Link Manager and L2CAP



     6.   What feature available in some Bluetooth devices increases data rates to 2.1 or 3 Mbps?
a.
Link Manager
c.
L2CAP
b.
radio module
d.
EDR



     7.   Which Bluetooth power class allows transmission ranges up to 330 feet?
a.
Power Class 1
c.
Power Class 3
b.
Power Class 2
d.
Power Class 4



     8.   Bluetooth 1.x uses a variation of which modulation technique?
a.
PSK
c.
FSK
b.
ASK
d.
GSK



     9.   What feature of Bluetooth version 3.0 uses a separate radio module that transmits using the same methods as IEEE 802.11?
a.
BLE
c.
AMP
b.
ULP
d.
NFC



   10.   Which transmission technique is used by Bluetooth devices?
a.
Narrowband
c.
DHSS
b.
FHSS
d.
UWB



   11.   Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a minimum of interference?
a.
adaptive frequency hopping
c.
alternate MAC/PHY
b.
frequency hopping spread spectrum
d.
Bluetooth low energy



   12.   What is created when a Bluetooth network has one master and at least one slave using the same channel?
a.
scatternet
c.
piconet
b.
wi-fi net
d.
bluenet



   13.   How is the master device determined in a Bluetooth network?
a.
the device with the lowest address number
c.
the first device to send out an inquiry message to discover other devices
b.
the device with the highest priority hop sequence on the piconet
d.
the device that carries out a paging procedure and establishes a connection



   14.   Which of the following is NOT a field in a Bluetooth frame?
a.
Access code
c.
Header
b.
Frame check sequence
d.
Payload



   15.   Which of the following is NOT a Bluetooth error correction scheme?
a.
1/3 rate FEC
c.
ARQ
b.
2/3 rate FEC
d.
CRC



   16.   In which Bluetooth power mode is only the slave device’s internal timer running?
a.
active mode
c.
hold mode
b.
sniff mode
d.
park mode



   17.   Which of the following is true about the ZigBee standard?
a.
designed to support mesh networking
c.
used for larger data transfers than Bluetooth
b.
replaced an existing global, open standard
d.
operates in the 5.0 and 6.5 GHz ISM bands



   18.   Which layer in a ZigBee device is responsible for detecting the presence of an RF signal in the currently selected channel?
a.
LLC
c.
MAC
b.
PHY
d.
Upper



   19.   Which task is the MAC layer responsible for in an 802.15.4 device?
a.
turning the radio transceiver on and off
c.
association and disassociation
b.
analyzing link quality
d.
selecting a frequency channel for operation



   20.   Which type of ZigBee device controls the network in a star topology?
a.
all end-node devices
c.
full-function device
b.
reduced function device
d.
PAN coordinator



COMPLETION

     1.   In a ZigBee tree topology, if a child loses it connection with its FFD, it becomes a(n) _____________.


     2.   ________________ is an 802.15.4-based technology that implements IPv6 on WPANs and supports mesh networking.


     3.   A ______________ authority is a private company that verifies the authenticity of each user in order to discourage fraud.


     4.   In Bluetooth Encryption Mode ______, all traffic is encrypted.


     5.   802.15.4 provides for _______________ integrity, a technique that uses a message integrity code.


MATCHING


a.
8-DPSK
f.
inquiry procedure
b.
ACL link
g.
MIC
c.
ARQ
h.
modulation index
d.
binding
i.
sequential freshness
e.
guaranteed time slots
j.
superframe


     1.   a reserved period for critical devices to transmit priority data

     2.   a simple method of phase shift keying that uses eight degrees of phase to encode tribits

     3.   the process of establishing a relationship between endpoints in a ZigBee network

     4.   a security service available in 802.15.4 and used by the receiving device

     5.   a process that enables a device to discover which devices are in range

     6.   a packet-switched link that is used for data transmissions

     7.   the amount that the frequency varies

     8.   an error-correction scheme that continuously retransmits until an acknowledgment is received or a timeout value is exceeded

     9.   a mechanism for managing transmissions in a piconet

   10.   a code composed of a subset of the data, the length of the data, and the symmetric key

       

SHORT ANSWER

     1.   What are the three types of addresses used in a Bluetooth piconet?  Describe each.


     2.   Describe the two types of physical links between Bluetooth devices.


     3.   What are the two types of network access used in IEEE 802.15.3 networks?  Describe them.


     4.   List three of the seven tasks the 802.15.4 MAC layer is responsible for.


     5.   What are the four levels of addresses for identifying devices within a ZigBee PAN?


     6.   What is a cluster tree topology and how do they compare to mesh networks?


     7.   How is power management implemented in a ZigBee network?


     8.   Describe the WirelessHART technology.


     9.   List and describe the three levels of Bluetooth security.


   10.   What is the process that ZigBee WPANs use for authentication and encryption?  Describe how it works.



Chapter 6 - High-Rate Wireless Personal Area Networks

TRUE/FALSE

     1.   IEEE 802.15 covers all the WPAN working groups.


     2.   The WHDI consortium developed the WHDI specification primarily for the delivery of data produced from online database queries.


     3.   The piconet coordinator in a WirelessHD network should be a battery operated device for mobility.


     4.   The DSPS power saving mode allows devices to sleep for long periods of time until they choose to wake up and listen to a beacon.


     5.   UWB is capable of handling multiple data streams, including HD television.


MULTIPLE CHOICE

     1.   Which IEEE standard enables multimedia connectivity between mobile and fixed consumer devices within the home?
a.
802.15.3c
c.
802.15.1
b.
802.15.5
d.
802.15.4



     2.   In which frequency range does WHDI operate?
a.
2.4 GHz
c.
5 GHz
b.
800 MHz
d.
400 KHz



     3.   Which of the following is true about WiGig?
a.
it is compatible with 802.11ac
c.
makes use of technology designed by AMIMON
b.
it requires layer 3 and 4 protocols for audiovisual support
d.
it has adopted the 802.15.3c standard for multimedia distribution



     4.   What does WiGig use to maintain reliable connections at very high frequencies?
a.
single-carrier modulation
c.
OFDM
b.
beamforming
d.
protocol adaptation layers



     5.   What technique does WirelessHD employ to support data rates over 25 Gbps?
a.
LRP
c.
HDMI
b.
spatial multiplexing
d.
beamforming



     6.   Which of the following is true about a WVAN piconet?
a.
the piconet relies on an access point
c.
large non-mobile devices like TVs are not part of a piconet
b.
the PNC is typically a mobile device such as a tablet computer
d.
the PNC is the first sink device in the area



     7.   Which of the following is described as a piconet that has its own PNC but depends on the original piconet’s PNC to allocate a private block of time when its devices are allowed to transmit?
a.
child piconet
c.
neighbor piconet
b.
parent piconet
d.
subordinate piconet



     8.   Which of the following is NOT an HR WPAN feature provided by the 802.15.3 MAC layer?
a.
uses a one-octet device ID
c.
data transport includes QoS
b.
PNC can be queried about other devices
d.
infrastructure mode networking is supported



     9.   Which part of an 802.15.3 superframe is used for association and command communication?
a.
contention access period
c.
channel time allocation period
b.
beacon
d.
management channel time allocation



   10.   What type of transmission method does an 802.15.3 piconet use during the CTAP?
a.
SDMA
c.
FDMA
b.
TDMA
d.
CDMA



   11.   Which field of the 802.15.3 MAC frame format is used to reassemble a file in the correct sequence?
a.
Frame control
c.
Fragmentation control
b.
Piconet ID
d.
Stream index



   12.   Which 802.15.3 power-saving methods allows devices to sleep for the duration of several superframes and allows them to wake up in the middle of a superframe to transmit or receive data?
a.
PSPS
c.
PSPS
b.
APS
d.
APCI



   13.   Which radio band does the 802.15.3c standard use?
a.
5.0 GHz
c.
2.4 GHz
b.
60 GHz
d.
p00 MHz



   14.   How many channels and what is the width of each 802.15.3c channel?
a.
4, 2 GHz
c.
11, 25 MHz
b.
6, 200 MHz
d.
14, 50 MHz



   15.   Which of the following is NOT a 802.15.3c PHY layer enhancement?
a.
passive scanning
c.
channel energy detection
b.
parity bit error detection
d.
transmit power control



   16.   The RF modulation techniques used for 802.15.3c are variations of which of the following?
a.
QAM and PSK
c.
NRZ-L and NRZ-I
b.
FSK and ASK
d.
BPSK and QPSK



   17.   In the WirelessHD specification 1.1, Which of the following is NOT a function of the higher protocol layers?
a.
video format selection
c.
device discovery
b.
clock synchronization
d.
video and audio encoding and decoding



   18.   What application has UWB been used for since the 1960’s?
a.
video streaming
c.
cellular phone towers
b.
ground-penetrating radar
d.
automobile speed detectors



   19.   What term is used for the technique in which the amplitude, polarity, or position of an analog pulse represents either a 1 or a 0?
a.
biphase modulation
c.
direct-sequence UWB
b.
mesh networking
d.
impulse modulation



   20.   What type of attack on a Bluetooth device can access contact lists without the user’s knowledge?
a.
bluejacking
c.
bluesnarfing
b.
bluespoofing
d.
blueDoS



COMPLETION

     1.   The IEEE 802.15.3c standard enables ________________ connectivity between mobile and fixed consumer devices within the home.


     2.   The WHDI specification is designed to mirror the screens of multiple devices to the TV screen with the use of ____________.


     3.   _____________________ uses multiple radios and antennas to steer a signal in the direction of the receiver.


     4.   ZigBee uses a(n) _______________ encryption key for network-wide communications.


     5.   Security for IEEE 802.15.3 HR WPANs is based on ________________, a symmetric key encryption mechanism.




No comments:

Post a Comment