Professional Documents
Culture Documents
Mobile Stations
Wireless Medium
Distribution Systems
Wired Medium
2. Which of the following features IEEE 802.11a and 802.11g wireless standards share
in common?
a)
b)
c)
d)
8. Following statements are True for Initialization Vector (IV) used in WEP security for
IEEE802.11 networks EXCEPT?
a)
b)
c)
d)
e)
9. Which of the following devices operate under Industrial Scientific and Medical (ISM)
band EXCEPT?
a)
b)
c)
d)
Ultrasonic Devices
FHSS LAN transceivers
Cordless phones
AM/FM radio tuners
10. Which of the following statements are true for Bluetooth EXCEPT?
a)
b)
c)
d)
11. In comparison to IEEE 802.11 LANs, HiperLAN2 offers more features, which are
following EXCEPT?
a)
b)
c)
d)
High-throughput transmission
Connection less communication networks
Dynamic frequency selection
Application and network independence
12. Which of the following types of wireless network attack can be classified as a passive
attack?
a) Masquerading
b) Flooding
c) Snooping
d) Man in the middle attack
13. In the piconet configuration of Bluetooth technology, which of the following devices
cannot actively participate but are known and can be reactivated within milliseconds?
a)
b)
c)
d)
Slave devices
Master Devices
Stand-by devices
Parked devices
14. Which of the following activities is not part of the radio frequency management for
wireless LANs?
a)
b)
c)
d)
Channel allocation
Frequency protection
Interference detection
Transmit power
15. Which of the following statements are true for Packet Switched Cellular networks
EXCEPT?
a) Serve a wide range of services including voice, data, e-mail, and digital video
b) It supports large population of infrequent users for economic viability
c) It centralizes the network control among interference units thus provides the
capability to support low dense user environments
d) The relatively unreliable cellular channel is more suited for packet switching
16. Which of the following subsystems belongs to the GSM system architecture
EXCEPT?
a)
b)
c)
d)
18. Which of the following standard is not an example of wireless Wide Area Network?
a)
b)
c)
d)
Wireless Fidelity
Broadband fixed wireless access (BFWA)
Wireless Broadband (WiBro)
IEEE 802.16 (WiMAX)
19. Which of the following statements concerning the uplink and downlink of satellite
transmissions is not true?
a) The uplink describes the signal that travels from the ground transmitter up to the
satellite receiver.
b) The Federal Communications Commission (FCC) in the United States allocates
the uplink and downlink frequency bands for satellite systems.
c) Satellite communications uplink frequency band and the downlink frequency
band (in a given system) are always the same.
d) The responsibility for allocating "International" frequencies falls under the
International Telecommunications Union (ITU).
20. Which of the following statements is true for frequency division multiple access
(FDMA)?
a) Frequency division multiple access (FDMA) assigns individual channels to
individual users
b) The bandwidths of FDMA channels are relatively narrow (30 kHz in AMPS) as
each channel supports only one circuit per carrier
c) The complexity of FDMA mobile systems is higher compared to TDMA systems
d) Since FDMA is a continuous transmission scheme, fewer bits are needed for
overhead purposes (such as synchronization and framing bits) as compared to
TDMA
Question B1
a) Despite the fact that WEP algorithm can be easily cracked, it is still a popular choice in
providing data privacy. Describe the working of WEP using a suitable scenario with
substantial justifications. Also explain five (5) drawbacks of WEP algorithm with
suitable examples?
(10 marks)
b) Explain the process of 802.11i security protocol for providing extensive security across
wireless networks? Also critically evaluate how its more secure then WEP.
(8 marks)
c) Describe the elements of network management system? Explain the steps how a
system is managed using suitable example. Also explain the purpose of (FCAPS)
model with desirable results
(12 marks)
Question B2
a) Explain Bluetooth technology with its uses? Describe the functionality of Piconet and
Scatternet. Also describe the categories of nodes in Piconets?
(10 marks)
b) Explain the four-step security mechanism used in Bluetooth to securely transfer data
between devices?
(8 marks)
c) Describe the sub systems of GSM architecture? Also describe the implementation of
the Time Division Multiple Access (TDMA) technique in terms of the process
involved.
(12 marks)
Question B3
a) Differentiate between HSCSD and CDPD techniques by evaluating them in terms of
cellular networks? Also describe the requirements established by the Wireless
Application Protocol (WAP) forum for solutions developed for wireless applications
and devices.
(10 marks)
b) Explain the working of WIMAX technology across MAN? State and describe the types
of quality of service guarantees supported by the Worldwide Interoperability for
Microwave Access (WiMAX) technology.
(12 marks)
c) Discuss how the geosynchronous orbit works to allow satellites to appear to remain
stationary while rotating around the earth on the equator.
(8 marks)