MWC Chapter 5

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Chapter 5

State any four features of bluetooth. 4M


Ans:
• Each Bluetooth device has the capability of sharing all of its features with other
• Bluetooth devices in the surrounding area.
• Bluetooth-enabled computer, sharing all the features, such as the Internet.
• Bluetooth devices can communicate at ranges of up to 10 meters (Class B)
• Bluetooth devices do not need to be in direct sight of each other.
• Frequency – 2.4 GHz
• Maximum Transmission rate is less than 1 Mbps

State any two features of bluetooth technology. 2M


Ans
Features of bluetooth technology:- (Any two)
1. It is implemented using IEEE 802.15 standard.
2. Used ISM band at 2.4 GHz
3. Uses FHSS technique
4. Data transfer rate is 1 Mbps.
5. Maximum range is 10 meters.
6. It is wireless PAN standard which uses radio link instead of wires.
7. Uses TDMA (TDD-TDMA)
8. Type of modulation used GFSK
9. It does not have a very good quality.
10. It uses 1600 hops / second.

Explain mobile ad-hoc network (MANET) with suitable diagram. 4M

Ans: Definition of MANET:


• MANET is defined as is a type of ad hoc network that can change locations and configure
itself on the fly.
• Because MANETS are mobile, they use wireless connections to connect to various
networks.
• It is an autonomous system of mobile host connected by wireless link.
• In MANET no infrastructure exists and network topology may dynamically change in an
unpredictable manner since nodes are free to move.
• Change in topology made known to other nodes so that outdated topology information
can be updated or removed.
• Ad-hoc network are basically peer to peer multi-hop mobile wireless network, where
information packets are transmitted in store and forward manner from source to arbitrary
destination.
Describe MANET and write applications of MANET.
4M
Ans
:
• Mobile ad hoc networks (MANETs) are envisioned to become key components in the
4G architecture, and ad hoc networking capabilities are expected to become an
important part of overall next-generation wireless network functionalities.
• Mobile ad hoc networks are formed dynamically by an autonomous system of mobile
nodes that are connected via wireless links without using an existing network
infrastructure or centralized administration.
• The nodes are free to move randomly and organize themselves arbitrarily; thus, the
network’s wireless topology may change rapidly and unpredictably.
• Such a network may operate in a standalone fashion, or may be connected to the larger
Internet.
• Mobile ad hoc networks are infrastructure less networks since they do not require any
fixed infrastructure such as a base station for their operation.
• Routes between nodes in an ad hoc network may include multiple hops and, hence, it is
appropriate to call such networks ―multihop wireless ad hoc networks.”
Applications.
• Personal area networking, cell phone, laptop, ear phone, wristwatch
• Military environments, soldiers, tanks, planes
• Civilian environment Carnet work meeting rooms

Illustrate operation of wireless LAN in Ad-hoc mode with neat and labelled diagram. 4M

Ans:
• An ad hoc network is one that is spontaneously formed when devices connect and
communicate with each other.
• Ad hoc networks are mostly wireless local area networks (LANs).
• The devices communicate with each other directly instead of relying on a base station or
access points as in wireless LANs for data transfer co-ordination.
• Each device participates in routing activity, by determining the route using the routing
algorithm and forwarding data to other devices via this route.

Applications of WLAN technology:-


1. For accessing internet, checking emails, receive and send instant message when user is
moving.
2. WLAN can set up networks in the location affected by earthquakes and other disasters
where no suitable infrastructure is available
Explain the architecture of Bluetooth technology.

• Bluetooth is both a hardware-based radio system and a software stack that specifies the
linkages between the architecture layers of the two.
• The protocol stack define how Bluetooth works.
• The Bluetooth protocol stack is a set of layered programs.
• Each layer in a protocol stack talks to the layer above it and to the layer below it.
• These layers range from the lower level hardware-based radio system, to an upper level
software stack that specifies the linkages between the layers .

Lower Stack Layers


• The lower layers are the basic core specifications that describe how Bluetooth works.
• The base of the Bluetooth protocol stack is the radio layer describes the physical
characteristics of the transceiver.
• It is responsible for modulation/demodulation of data for transmitting or receiving over
radio frequencies in the 2.4 GHz band.
• This is the physical wireless connection.
• It splits the transmission band into 79 channels and performs fast frequency hopping
(1600 hops/sec) for security.

Upper Stack Layers


• The upper stack layers consist of profile specifications that focus on how to build devices
that will communicate with each other, using the core technology.
• The host controller interface (HCI) serves as the interface between the software part of
the system and the hardware (i.e., the device driver).
• The L2CAP (logical link control and adaptation protocol) layer is above the HCI in the
upper stack.
• It plays a central role in communication between the upper and lower layers of the
Bluetooth stack.
• It keeps track of where data packets come from and where they should go. It is a required
part of every Bluetooth system.
• The service discovery protocol (SDP) provides the interface to the link controller and
allows for interoperability between Bluetooth devices.

Write four applications of MANET. 4M

Ans:
Any 4 Applications.
• Personal area networking: cell phone, laptop, ear phone, wrist watch
• Military environments: soldiers, tanks, planes
• Civilian environments:car network
• eeting rooms:sports stadiums,boats, small aircraft
• Emergency operations: search-and-rescue,policing and fire fighting

Give the classification of RFID tags and give the application of RFID. 6M

Ans : Classification of RFID Tags:

Applications of RFID:
Automotive:

• Auto makers have added security and convenience to automobiles by using RFID technology
for anti-theft immobilizers and passive entry systems.
• Some auto manufacturers use RFID systems to move cars through an assembly line. At each
successive stage of production, the RFID tag tells the computers what the next step of the
automated assembly is.

Animal tracking:

• Ranchers and livestock producers use RFID technology to meet export regulations and optimize
livestock value.

• Wild animals are tracked in ecological studies, and many pets who are tagged are returned to their
owners.

• Thus a tag can carry information as simple as a pet owner’s name and address.

Assets tracking:

• Hospitals and pharmacies meet tough product accountability legislation with RFID; libraries limit theft
and keep books in circulation more efficiently.

Contactless commerce:

• Blue-chip companies such as American Express, Exxon Mobile, and MasterCard use innovative form
factors enabled by RFID technology to strengthen brand loyalty and boost revenue per customer.

Supply chain:

• Wal-Mart, Target, Best Buy, and other retailers have discovered that RFID technology can keep
inventories at the optimal level, reduce out of stock losses, limit shoplifting, and speed customers
through check-out lines.

Replacement for bar codes:

• RFID can serve a lot of advantages by replacing bar codes.

• One of the key differences between RFID and bar code technology is RFID eliminates the need of line-
of-sight reading that bar coding depends on.

• Also, RFID scanning can be done at greater distances than bar code scanning. High frequency RFID
systems (850–950 MHz, 2.4–2.5 GHz) offer transmission ranges more than 90 feet.

• Barcodes are fixed at the time of printing and can be rendered useless by defacement or smudging.
• Bar codes can be spoofed or easily defeated by any malicious individual having a laser printer at their
disposal. Note: marks to be credited if classification is given on frequency bases

You might also like