Final Exam CNET324 Fall2010 Multiple Choice Identify the choice that best completes the statement or answers

the question. 1. The term ____ is often used to describe all types of devices and technologies that are not connected by a wire. d. wireless 2. ____ telephones carry digitized voice over the Internet. a. Voice over Internet Protocol (VoIP) 3. ____ tags are small chips containing radio transponders that can be used to track inventory. b. RFID 4. Bluetooth and ____ are wireless standards designed for very short ranges—typically only a few inches or feet. c. Ultra Wide Band (UWB) 5. A ____ consists of two or more Bluetooth devices that are exchanging data with each other. b. piconet 6. 3G sends data at rates of up to ____ Mbps when stationary. a. 2 7. A ____ is an extension of a wired LAN, connecting to it through a device called a wireless access point. c. WLAN 8. In a WLAN, the ____ relays data signals between all of the devices in the network, including file servers, printers, and even other access points (and the wireless devices connected to them). d. access point (AP) 9. Each computer on the WLAN has a ____. This card performs the same basic functions and looks similar to a traditional NIC except that it does not have a cable that connects it to a network jack in the wall. d. wireless network interface card 10. Depending on the standard used,WLANs can transmit at speeds anywhere from 11 Mbps up to 54 Mbps and at distances of up to ____ feet. c. 375 11. Integrated Services Digital Networks (ISDN) lines transmit at ____ Kbps over regular phone lines. c. 128 12. The maximum transmission speed that can be achieved with cable modem and DSL is only about ____ Mbps. a. 2 13. IEEE 802.16 wireless devices can be as far as ____ away. b. 35 miles (56 kilometers) 14. A ____ is a miniaturized version of a Web browser program that is based on version 2.0 of the Wireless Application Protocol (WAP). a. microbrowser 15. ____ provides a standard way to transmit, format, and display Internet data for small wireless devices such as cell phones. b. WA WAP2

b. 4 d. a. 6 b. d. frequency 29. d. An infrared ____ transmission requires that the emitter and detector be directly aimed at one another. a. 2 c. A(n) ____ signal consists of discrete or separate pulses. There are two basic types of waves by which wireless data are sent and received: ____ light and radio waves. d.16. d. a. In an infrared wireless system. in other words. 10 19. A(n) ____ is a continuous wave (CW) of constant amplitude (also called voltage) and frequency. Two competing software programming languages—BREW (Binary Run-Time Environment for Wireless) and ____—are designed and optimized to display text. J2ME (Java 2 Micro Edition) ? 18 . graphics. directed 24. digital 28. bits 21. carrier signal . A(n) _analog___ signal is one in which the intensity (voltage or amplitude) varies and is broadcast continuously. it is sending ____ code and any files (such as graphics) required to assemble the page. c. and even animations on the small screen of a cellular phone. The number of times a cycle occurs within one second equals the ____ of a wave. c. b. a. then collect data and transmit it to a central location. In industrial control. 26. emitter 23. the signal has no breaks in it. 27. diffused 25. motes 20. HTML 17. the digits 0 and 1 are known as ____. Diffused infrared can send data at only up to __8__ Mbps. infrared 22. In a binary number system. SWAP devices could be as far as 150 feet (45 meters) apart and could send and receive data up to ____ Mbps. An infrared ____ transmission relies on reflected light. a(n) ____ is usually a laser diode or a light emitting diode (LED). remote sensors called ____ can connect to a WLAN. When a Web server sends a Web page back to a PC.

as well as for being detected correctly by the receiver. All signals that are above the minimum threshold are allowed to pass through. a. d. a. b. a. Barker 40. and every time the signal changes. ____ transmissions means that each signal transmits on one radio frequency or a very narrow range of frequencies. it is called a __tribit__. frequency modulation (FM) 36. the height of the carrier wave is changed in accordance with the height of another analog signal. With ____. amplitude modulation (AM) 35. 33. while the amplitude and phase of the carrier remain constant. for the entire length of the bit period.30. d. baud 32. a. A ____ code (or chipping code) is a particular sequence of 1s and 0s that has properties that make it ideal for modulating radio waves. the voltage signal remains positive. high-pass . Frequency hopping spread spectrum c. frequency. Analog 34. or a combination of these. b. A(n) __filter__ removes all the RF signals that are not wanted. Narrow-band b. When a signal unit can represent three bits. or high. b. Direct sequence spread spectrum 39. In ____. called the modulating signal. 41. A ____ filter sets a minimum frequency threshold level. antenna 31. A ____ is a change in the signal. with one end free and the other end connected to a receiver or transmitter. In ____ the number of waves that occur in one second change based on the amplitude of the modulating signal. phase. or similar material. ____ modulation is the representation of analog information by an analog signal. a. ____ modulation is the method of encoding a digital signal onto an analog wave for transmission over a medium that does not support digital signals. A(n) ____ is a length of copper wire. non-return-to-zero ?38. in amplitude. Digital 37. it defines the boundary of a signal unit. Spread spectrum d. while those below the minimum threshold are blocked.

_SNR___ compares the signal strength with the background noise. data networks use ____ switching. packet 49. Switching 48. a. 44. ____ transmissions allow data to flow in both directions simultaneously. d. c.42. c. American National Standards Institute (ANSI) 54. The ____ functions largely as a clearinghouse for all kinds of standards development in the United States. a.Each user is assigned the entire frequency for the transmission for a fraction of time on a fixed. but only one way at a time. b. ____ divides the transmission time into several slots . a. Instead of using circuit switching. Half-Duplex 46. rotating basis. b. TDMA 47. d. ____ involves moving the signal from one wire or frequency to another. 50. ____ transmission sends data in both directions. . c. The __amplifier__ essentially increases the amplitude of an RF signal. Full-Duplex 45. The purpose of a(n) ____ is to combine two radio frequency inputs to create a single output. a. The ____ is responsible for defining the overall architecture of the Internet and also serves as the technology advisory group to the Internet Society (ISOC). International Telegraph Union (ITU) 52. A(n) ____ antenna radiates the electromagnetic waves in one direction only and can help reduce or eliminate the effect of multipath distortion if there is a clear line of sight between the two antennas. mixer 43. directional 51. De jure 53. The world’s first telecommunications standard was published by the ____ in 1885.____ standards are those that are controlled by an organization or body that has been entrusted with that task. Internet Architecture Board (IAB) 55. The ____ develops telecommunications standards for use throughout Europe.

International Telecommunications Union (ITU) 57. dBm 63. loss 62. when this happens. radio frequency spectrum 59. bands 60. d. dB 65. ____ antennas are used to transmit and receive signals from all directions with relatively equal intensity. omnidirectional antennas d. For microwave and higher frequency antennas. European Telecommunications Standards Institute (ETSI) 56. ____ is a relative way to indicate an absolute power level in the linear Watt scale. b. the effect is called a(n) _gain___. dB isotropic (dBi) 66. isotropic radiator 64. 67. free space loss 69. or similar conductive material. The orientation of the wave leaving the antenna is called ____. b. 61. patch antennas c. Omnidirectional ____ 68.d. c. Cables and connectors offer a resistance to the flow of electricity and therefore they tend to decrease the power of a signal. An amplifier boosts the power of a signal. wavelength 70. This decrease is called a(n) ____. or ____. __Passive__ antennas are the most common type and are constructed of a piece of metal. a. a. is what determines the size of an antenna. antenna polarization . The ____ is the entire range of all radio frequencies that exist. the gain is usually expressed in ____. and shape of the RF signal beam coming from the antenna. width. b. 58. The radio frequency spectrum is divided into 450 different sections. In ____. or the ____. A(n) ____ is a theoretical perfect sphere that radiates power equally in all directions. wire. a. The ____ indicates the direction. The ____ is an agency of the United Nations that is responsible for telecommunications. a. the _FCC___ serves as the primary regulatory agency for telecommunications. a. antenna pattern 71. wavelength b. a. RF waves tend to spread away from the source of the signal (the antenna). The gain of antennas is usually expressed in ____. The length of a single RF sine wave. b. a. In the United States.

a. Media Access Control (MAC) 83. Antennas organized in a two-dimensional pattern. Logical Link Control (LLC) 82. The ____ layer is responsible for establishing and maintaining connectivity to the local network. In most wireless communications applications. Impedance 79.72. ____ antennas “know” where the mobile receiver is. horn 75. The most common infrared connection today is based on the ____ specifications. c. coaxial 77. c. a. and capacitance of the circuit. b. A(n) ____ antenna resembles a large horn with the wide end bent to one side. One-dimensional 73. This is called a ____ wireless link. and can track it and focus the RF energy in that particular direction to avoid wasting energy and to prevent interference with other antennas. a. . one transmitter communicates with several mobile clients. d. with both height and width. Fresnel zone 81. Impedance is measured in ____. inductance. The ____ is responsible for hardware addressing and error detection and correction. d. Most antennas are connected to the transmitter or receiver using ____ cable. Smart 76. c. This elliptical region is called the ____. ohms 78. The space between two antennas would be more accurately represented by something similar to an ellipse. point-to-multipoint 80. ____ antennas are basically a length of wire or metal. ____ is the combination of resistance. b. are known as ____ antennas. two-dimensional 74. b.

Authentication 99.15. ____ uses two carrier waves that are exactly 90 degrees out of phase and therefore do not interfere with each other. or key. certificate authority 98. b.d.4 handles all access from the upper layers to the physical radio channel. The IEEE ____ standard defines the specifications for HR WPANs supporting speeds of 11. handles packets. message integrity code (MIC) 101. 33. Encryption 100. provided by a certificate authority. The Bluetooth ____ layer defines how the basic hardware that controls the radio transmissions functions. FIR uses a modulation scheme called ____ in which information is conveyed by the position of a pulse within a time slot. a.3 . At the heart of the Bluetooth RF layer is a single radio transmitter/receiver (transceiver). The Bluetooth ____ layer manages physical channels and links. the length field. A(n) ____ link is a symmetric point-to-point link between a master and a single slave in the piconet. 802. RF 86. MAC 93. Offset quadrature phase shift keying (O-QPSK) 92. A ____ is a unique security code. Baseband 88. Frame integrity is a technique that uses a(n) ____. The ____ layer in 802. This single tiny chip is called a Bluetooth ____. d. radio module 87. c.4 GHz frequency into 79 different frequencies. public key infrastructure (PKI) 97. devices query other devices to identify the location and number of devices that are connected to the network in a process called ____. d. ____ are reserved periods for critical devices to transmit priority data between two beacons. c. synchronous connection-oriented (SCO) 91. channels 89. a. a. and not who is using the device. a. adaptive frequency hopping (AFH) 90. d. ____ in a Bluetooth piconet is based on identifying the device itself. and does paging and inquiry to locate other Bluetooth devices in the area. ____ is the process of encoding communications and ensures that the transmissions cannot be easily intercepted and decoded. c. 4-PPM 85. b. A ____ is a private company that verifies the authenticity of each user to avoid the possibility of fraud. d. d. spaced 1 MHz apart. device discovery 96. a. and the symmetric key. IrDA 84. called ____. Bluetooth divides the 2. In a ZigBee network. Bluetooth version 1.11b. c.2 adds a feature called ____ that further improves compatibility with 802. a sequence of bits based on a subset of the data itself. b. and up to 55 Mbps in the 2. Guaranteed time slots (GTS) 94. b. beacon 95. 22.15. A ____ signals the beginning of a superframe and contains information about the type and number of time slots contained in the superframe.4 GHz ISM band.

b. . 2. a. ____ modulation uses a half-cycle positive analog pulse to represent a 1 and a half-cycle negative analog pulse to represent a 0. Child 105. have two options for wireless NICs. in which the child PNC is a member of the original or parent piconet.15. Hand-off 119. d. Denial-of-service (DoS) 115. a. such as voice stream. d. In 802. provided that the user has enabled the server functions on their device. wireless residential gateway 122. Smaller devices. hackers exploit a Bluetooth device’s ability to discover nearby devices and send unsolicited messages. ____ uses a Bluetooth device’s ability to discover nearby devices to access contact lists and other information without the user’s knowledge. time-sensitive traffic. Quality-of-service (QOS) 103. AES 116.____ time. a. a. Bluetooth uses the ISM ____ GHz band for its transmissions. ____ encodes the digital signal in such a way that single bit errors can be detected and corrected. Spectrum conflict 120. ____ piconets are separate piconets that have their own PNC but that depend on the original piconet’s PNC to allocate a private block of time when their devices are allowed to transmit. ____ capabilities allow devices to request more channel access time in order to prioritize high-volume. ____ piconets are separate piconets.4 121. c. a. without using any spreading codes. A ____ is a device that combines a router. Bluesnarfing 114. The ____ is the superframe designated by the PNC in which devices that are in power save mode wake up and listen for frames addressed to them. ____ attacks flood a Bluetooth device with so many frames that it is unable to communicate. a. ____ is the ability of a device to move from one master or PNC to another without getting disconnected from the network in a network that extends beyond the communications range of each device that controls the communications. d. c. ____ is an set of protocol implementation rules that will enable wireless FireWire at 400 Mbps based on an 802. sled 123. d. c. which includes a Type II PC Card slot and an additional battery. 128 117. In ____.3AES uses a ____-bit key.15. Bluejacking 113. c. Some offer an optional ____. the polarity. Isochronous 107. b. CF or ____ cards consist of a small circuit board that contains a dedicated controller chip and a very small antenna. Neighbor 106. Protocol Adaptation Layer (PAL) 112. ____ adds certain encrypted random data to each communications session so that the receiver can verify that the message has not been tampered with during transit. b. Trellis code modulation (TCM) 104. c.102. or the position of an analog pulse represents either a 1 or a 0. ____ is the potential for technologies using the same frequency bands to interfere with each other to the extent that they sometimes perform poorly when used within close range of each other. b. ____ is a symmetric key encryption mechanism introduced by the National Institute of Standards and Technology (NIST) in the United States. and wireless access point. Direct-sequence UWB (DS-UWB) 111. Message integrity 118. d. Impulse 109. b. Ethernet switch. ____ takes advantage of the fact that one of the effects of transmitting pulses that are a nanosecond long—or even shorter—is that the signal naturally spreads over a very wide frequency band.3a/WiMedia platform. ____ modulation means that the amplitude. wake superframe 108. which means a time-dependent or synchronous transmission that must be made every frame or every so many frames to maintain the quality of the connection. such as PDAs. Biphase 110. with their own unique ID.

b. 11 144. Extended Service Set (ESS) 126. null data frame 135. When using PCF.11 a has a maximum rated standard speed of ___54_ Mbps. 802.11b standard provides for an optional polling function known as ____. In 802. c. The 802. d. ad hoc 125. Fragmentation 133. Data 139. b. c.25 GHz) and Middle Band (5. The ____ standard defines a local area network that provides cable-free data access for clients that are either mobile or in a fixed location at a rate of either 1 or 2 Mbps using either diffused infrared or RF transmission. point coordination function (PCF) 134. d. a. ____ scanning involves a client listening to each available channel for a set period of time (usually 10 seconds).35 GHz). b. b.11a standard uses the ____ band for its transmissions. an 802.11 standards uses an access method known as the ____ to avoid collisions. 141.11 frame’s size is not measured in bits but in ____. wireless clients communicate directly among themselves without using an AP. control 138. power management 137. b. a. 1 131. 802. 16-level quadrature amplitude modulation (16-QAM) . a.a. The 802. Even though it contains data.11b PLCP frame preamble and header are always transmitted at ____ Mbps to allow for communication between slower and faster devices. c. d. The entire family of 802.11 128. ____ involves dividing the data to be transmitted from one large frame into several smaller ones. providing users with uninterrupted mobile access to the network. 802. The client listens for a beacon frame transmitted from all available APs. the ____ frames provide assistance in delivering the frames that contain the data. network managers usually subdivide large networks into units known as ____ that contain fewer computers. ISM 142. IEEE 802.11b the available frequency spectrum (2. a.412 to 2.15 to 5.11a. if a client has nothing to send. After association and authentication between the clients and the APs are established. c.11b standard uses one part of the unlicensed ____ band for its transmissions. In 802. c.25 to 5. time slots 129. transmitting at 24 Mbps requires a ____ technique.484 GHz) is divided into ____ channels in the United States. ____ MAC frames carry the information to be transmitted to the destination client. SD 124. a. b. U-NII 143. The 802. PMD 130. a.11 ____ are designed to handle the contention for the medium among several devices attempting to communicate. Because of this. With 802. 8 145. Sometimes it is difficult to manage one large network. distributed coordination function (DCF) 132. Passive 136. then that client returns a ____ to the point coordinator. subnets 127. The ____ translates the binary 1s and 0s of the frame into light pulses that are used for transmission.11b standard ____ allows the mobile client’s NIC to be off as much as possible to conserve battery life but still not miss out on data transmissions. A(n) ____ is simply two or more BSS wireless networks installed within the same area. c.11a. ____ frequency channels operate simultaneously in the Low Band (5. The 802. In ____ mode. interframe spaces 140.

Privacy 157. Multiple-in. PBCC uses a ____ state code (the spreading code) to send 8 bits per transmission symbol. c. copper-based digital communications lines. When both 802. even if those transmissions fall into the wrong hands. 6.4 GHz ISM band. c. In 802.11b and 802. HiperLAN/2 154. the AP. ____ technology uses multiple antennas and also uses the reflected signals (multipath) to extend the range of the WLAN. c. data rates of 54 Mbps are achieved by using ____. ____ offers high-speed wireless connectivity with up to 54 Mbps and seamless connectivity with other types of communications systems. The IEEE 802.11a.11 to expand support for LAN applications that require Quality of Service (QoS). 802. d. and the RADIUS server. a. Authentication 156. WEP 158. A ____ allows you to use an existing wireless or wired network to stream music and video files from your computer or from the Internet directly to your TV or stereo system. DSSS 149. The 802.____ is a proposed standard aimed at providing data rates higher than 100 Mbps using the 2. the 802. IEEE ____ defines enhancements to the MAC layer of 802. such as T1. 64-level quadrature amplitude modulation (64-QAM) 147. a.000 feet (1. b. Microwave towers are installed roughly ____ miles apart from each other.11g standard specifies that it operates in the same frequency band as ____. b.1X uses the ____ for relaying access requests between a wireless device. WPA uses a 128-bit ____. cable TV. pre-shared key (PSK) 159. require the signal to be regenerated every ____.146.11b 148. a.8 kilometers) 161. which is also called personal mode. ____ is a process that verifies that the client device has permission to access the network. such as cellular telephone systems and FireWire networks.11g devices share the same network. ____ standards attempt to ensure that transmissions are not read by unauthorized users. 256 150. and other communications providers who own the wires and transmission towers that carry voice and data traffic. The term ____ refers to telephone. b.11 standard provides an optional ____ specification for data encryption between wireless devices to prevent eavesdropping. 802. . 802. wireless media gateway 155.11n 152. b.11g standard defines how the frame header is transmitted at 1 or 2 Mbps using ____. d. d. carrier 162. 802.11e 151. a. a. Extensible Authentication Protocol (EAP) 160. For long-distance connections between cities and states. multiple-out (MIMO) 153. a.

Digital certificates . In 802. which are sets of predefined connection parameters. beam divergence 167. a. frequency division duplexing (FDD) 176. backhaul 164. 35 163. Triple-play 174. the transmitted beam is purposely allowed to spread. Profiles 177. system profile 178. b. c. scintillation b. b.16 170. such as a local area network or telephone system. Jitter 180.16 standard defines several transmission ____. c. IEEE ____ is the standard for wireless broadband metropolitan area networks. LMDS can transmit from 51 to ____ Mbps downstream. WiMAX 172. 155 168. c. d. active tracking c.16. 802. telephone (voice). WiMAX allows the use of two different frequency channels. and data on the same network. A(n) ____ can transmit multiple simultaneous signals in different directions to stations that fall within the range of each of the antennas. The term ____ stands for worldwide interoperability for microwave access. d. in which case one is used for downlink and another for uplink. so that by the time it arrives at the receiving device it forms a fairly large optical cone. A data transmission to or from a single device is called a ____ in the 802. burst 175. ____ are the devices that are installed in a customer’s office or home. A ____ transmission sends multiple signals at different frequencies. d. A WiMAX ____ is a combination of the basic profile and one of the transmission profiles and is preset on the equipment before it is shipped to an end-user site. b. baseband 166.16 standard. c. spatial diversity d. broadband 165. a ____ can be either a laptop computer or device that attaches to a LAN. or diverge. This mechanism is called ____. b. ____ is a transmission convergence that support TV (video). d. subscriber station (SS) 171. a. a. advanced antenna system (AAS) 179. In ____. a. A ____ transmission treats the entire transmission medium as if it were only one channel. d. A(n) ____ connects to other services. Customer premises equipment (CPE) 173. A ____ connection is a company’s internal infrastructure connection. ____ is the maximum delay variation between two consecutive packets over a period of time. The 802. ____ are messages digitally signed by a certification authority. a.c. network interface unit (NIU) 169.