MWC Chapter 5
MWC Chapter 5
MWC Chapter 5
Illustrate operation of wireless LAN in Ad-hoc mode with neat and labelled diagram. 4M
Ans:
• An ad hoc network is one that is spontaneously formed when devices connect and
communicate with each other.
• Ad hoc networks are mostly wireless local area networks (LANs).
• The devices communicate with each other directly instead of relying on a base station or
access points as in wireless LANs for data transfer co-ordination.
• Each device participates in routing activity, by determining the route using the routing
algorithm and forwarding data to other devices via this route.
• Bluetooth is both a hardware-based radio system and a software stack that specifies the
linkages between the architecture layers of the two.
• The protocol stack define how Bluetooth works.
• The Bluetooth protocol stack is a set of layered programs.
• Each layer in a protocol stack talks to the layer above it and to the layer below it.
• These layers range from the lower level hardware-based radio system, to an upper level
software stack that specifies the linkages between the layers .
Ans:
Any 4 Applications.
• Personal area networking: cell phone, laptop, ear phone, wrist watch
• Military environments: soldiers, tanks, planes
• Civilian environments:car network
• eeting rooms:sports stadiums,boats, small aircraft
• Emergency operations: search-and-rescue,policing and fire fighting
Give the classification of RFID tags and give the application of RFID. 6M
Applications of RFID:
Automotive:
• Auto makers have added security and convenience to automobiles by using RFID technology
for anti-theft immobilizers and passive entry systems.
• Some auto manufacturers use RFID systems to move cars through an assembly line. At each
successive stage of production, the RFID tag tells the computers what the next step of the
automated assembly is.
Animal tracking:
• Ranchers and livestock producers use RFID technology to meet export regulations and optimize
livestock value.
• Wild animals are tracked in ecological studies, and many pets who are tagged are returned to their
owners.
• Thus a tag can carry information as simple as a pet owner’s name and address.
Assets tracking:
• Hospitals and pharmacies meet tough product accountability legislation with RFID; libraries limit theft
and keep books in circulation more efficiently.
Contactless commerce:
• Blue-chip companies such as American Express, Exxon Mobile, and MasterCard use innovative form
factors enabled by RFID technology to strengthen brand loyalty and boost revenue per customer.
Supply chain:
• Wal-Mart, Target, Best Buy, and other retailers have discovered that RFID technology can keep
inventories at the optimal level, reduce out of stock losses, limit shoplifting, and speed customers
through check-out lines.
• One of the key differences between RFID and bar code technology is RFID eliminates the need of line-
of-sight reading that bar coding depends on.
• Also, RFID scanning can be done at greater distances than bar code scanning. High frequency RFID
systems (850–950 MHz, 2.4–2.5 GHz) offer transmission ranges more than 90 feet.
• Barcodes are fixed at the time of printing and can be rendered useless by defacement or smudging.
• Bar codes can be spoofed or easily defeated by any malicious individual having a laser printer at their
disposal. Note: marks to be credited if classification is given on frequency bases