Wireless Communications and Networks

Published on November 2016 | Categories: Documents | Downloads: 92 | Comments: 0 | Views: 854
of 4
Download PDF   Embed   Report

Wireless Communications and Networ

Comments

Content

www.jntuworld.com

I. Data rate of diffused IR LANS is _____ Mbps:->3 2. Typical coverage area of a wireless LAN has a diameter of:->100 -300m 3. Data rate of diffused IR LANS is _____ Mbps:->4 4. IR data transmission uses _____ modulation.: ->intensity 5. The LAN that operates at microwave frequencies is:-> Narrowband microwave LAN. 6. Access method used in IR LANS is _____:-> b & c 7. Radio LAN operates in ___ band:->5.8 GHz 8. The LAN that operate at ISM bands is:->SS LAN 9. Licensing is not required for ___ LAN’s:->Narrowband Radio 10. IEEE 802.1 lg operates in ___band :-> 2.4 GHz 11. The reason for extremely high data rates in IR LAN is:->Unlimited spectrum 12.___ standard is referred as a regulatory dontain update:->IEEE 802 .11d 13. Available bandwidth for 802.11 standard is_:->83.5MHz 14. Number of non-over1apping channels is _____ ->3 15. The transmission technique in IR LAN that can be used to creat point-to-point link is :->Direct beam 16. IEEE 802.11 a makes use of frequency band called :-> UNNI 17. Modulation technique for Bluetooth is___:-”Guassian FSK 18. The 1owst layer of IEEE 802 protocol is :-.>Physical 19. Bluetooth devices operate in the range of_ __ m:->10 20. Data rate for bluetooth radio is _Mbps:->1 21. The unit of data exchanged between two peer MAC entities using the services of the Physical layer in IEEE 802.11 is :->MPDU 22. Bluetooth makes use of ____frequency band :-> 2.4GHz 23. Frrquency hop rate for Bluetooth radio is____hops/sec:->1600 24.In IEEE 802.11, the primary service that is used by the stations to exchange MAC frame is :-> Distribution 25. ___scheme is used in the physicallayer of 802.15.3:->TCM 26. IEEE standard for WPAN IS ____ :-> 802.15 27. The Boolean logic operator that is employed in wired equivalent privacy algorithm is ->XOR 28.RECOMM is a _____ protocol :-> cable replacement 29. Core protocols of bluetooth consists of ___layers:->4 30. The core protocol in Bluetooth that specifies the details of air interface is:-> Radio 31. How many layers are present in SMS?:->4 32.___ provides security services between Mobile device and client:->WTLS 33. The basic unit of networking in a bluetooth is :->Piconet 34. WAP— stands for: ->Wireless application Protocol 35. .___ provides security services between Mobile device and client:->WTLS 36. The overlapping of a device among two piconets form a :-> scatternet 37.I-mode devices transmit at a data rate of___bps:-> 1800 38.HIPERLAN is ___service:->Request-reply 39.An example of independent mobile data network with licensed band is :->ARDIS Mobitex 40. Data rate for HIPERLAN is ____ Mbps:-> 23.5 41. An example of shared mobile data network is :-> CDPD 42. Encryption technique used in HIPERLAN IS ___:->3DES 43. GPRS is a mobile data network service that is :->Overlay on traffic channels 44. Frequency of operation for HIPERLAN is -:->5.2GHz 45. An example of mobile data network with overlay on signaling channels:->SMS 46. ATM is ___ technique:->Multiplexing 47. According to ATM forum, the protocols that connect user terminals to switches and Connecting two switches together are defined respectively by : ->UNI, NNI protocols.

www.jntuworld.com

www.jntuworld.com

48. ATM stands for :->Asynchronous transfer mode 49. The HIPERLAN type which provides wireless IP an ATM remote access (5km) is ->HIPFR ACCESS 50. WATM supports _____ transfer of data.:->bidirectional 51. The HIPERLAN type that provides wireless broadband interconnect is:->HIPER LINK 52. Maximum throughput for HIPERLAN is ____ Mbps :-> 24 53. Maximum transfer rate for HIPERLAN is ____ Mbps :-> 32 54. The length of ATM cells is of ___ bytes :->53 55. The HIPERLAN type that provides wireless IP and ATM shortrange access is:->HIPERLAN TYPE 2 56. The length of header in ATM cell is of ___ bytes:->5

www.jntuworld.com

www.jntuworld.com

WIRELESS COMMUNICATIONS AND NETWORKS Objective Exam

1.

Which of the following profile specifies the procedure for accessing the dial up services and internet services utilizing Bluetooth technology? [ ] A. cordless telephony and intercom B. headset C. dial-up networking D. PAN access. Protocol architecture of Bluetooth is based on _____ types of protocols. A. 3 B. 4 C. 2 D. 5 [ ]

2.

3.

Which of the following is not related in defining the delays by Distributed coordination function [ ] A. IFS B. SIFS C. BIFS D. DIFS Which of the following are data transmission techniques for IR LANs A. directed beam IR LANs B. Omni directional IR LANs C. diffused IR LANs D. all the above. [ ]

4.

5.

Cable replacement protocol supports upto ______ connections between two Bluetooth devices. [ ] A. 40 B. 35 C. 60 D. 75 Which of the following protocol defines call control signaling that specifies how data calls and speech can be established among various Bluetooth devices? [ ] A. TCS BIN protocol B. CABLE replacement protocol C. ADOPTED protocol D. CORE protocol. Frequency hopping is a wireless modulation method that avoids A. multipath effects B. interference C. both A & B HIPERLINK is a combination of A. HIPERLAN-1 and HIPERACCESS. C. HIPERLAN-2 and HIPERACCESS. [ ] D. none of the above. [ B. HIPERLAN-1 and HIPERLAN-2. D. HIPERLAN-2 and HIPERLAN-4. [ D. all the above [ ] ] ]

6.

7.

8.

9.

Access code is divided in to which of the following types A. CAC B. DAC C. IAC

10.

Which of the following are present in both uplink and downlink channels? A. RCH B. BCH C. SCH D. ACH

www.jntuworld.com

www.jntuworld.com

Fill in the blanks 11. The cyclic redundancy or frame check sequence field contains the error-detecting code specified by the __________ layer. LLC uses ______________ to support unacknowledged connectionless service. RC4 defines a ________________ that takes the seed as input and generates a key sequence. ETSI stands for__________________. The wired equivalent privacy algorithm is provided by ___________ to wireless LANs so that they can be secured to have full privacy in their transmissions. The establishment or termination of a connection oriented channel requires the local and the remote devices to exchange________________. The _______________ algorithm is provided by IEEE 802.11 to wireless LANs so that they can be secured to have full privacy in their transmissions. L2CAP stands for__________. OFDM overcomes ISI and minimizes the effect of fading caused due to __________ In GPRS network services _________ approach is based on IP and CLNP and is called as PTPCLNS. -oOo-

12. 13. 14. 15.

16.

17.

18. 19. 20.

www.jntuworld.com

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close