Free Essay

Wireless Chapter 2

In: Computers and Technology

Submitted By BEN219BROWN
Words 921
Pages 4
Wireless Networking Chapter 3 Study Guide


___T 1. Electromagnetic waves travel through space at the speed of light.

___F 2. Whenever a wave moves to the maximum voltage, then down to the minimum voltage, and then returns back to the starting point, it has finished two cycles.

___T 3. The ASK 1 bit has a carrier signal (positive voltage) while a 0 bit has no signal (zero voltage).

___F 4. One of the units of measurement used to represent RF signal strength is Ohms.

___T 5. Mulitple copies of an RF signal may reach the receiver at different times due to reflection.

Multiple Choice
Identify the choice that best completes the statement or answers the question.

____ 6. Which of the following is an electromagnetic wave? a. | light | c. | radio | b. | heat | d. | All of the above |

____ 7. Which of the following units is used to measure frequency? a. | decibel | c. | hertz | b. | volt | d. | byte |

____ 8. The term ____ describes the rate of electrical flow. a. | voltage | c. | resistance | b. | current | d. | electrical power |

____ 9. ____ modulation changes the number of waves representing one cycle. a. | Amplitude | c. | Frequency | b. | Phase shift | d. | Phase |

____ 10. Which type of modulation changes the starting point of the cycle to represent a change from a 1 bit to a 0 bit and vice versa? a. | AM | c. | DM | b. | FM | d. | PM |

____ 11. Which binary modulation technique is similar to frequency modulation? a. | amplitude shift keying | c. | phase shift keying | b. | frequency shift keying | d. | All of the above |

____ 12. Power of an electromagnetic signal such as one used in WLANs is measured by which unit? a. | millivolts | c. | milliohms | b. | milliamps | d. | milliwatts |

____ 13. When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line. This is known as ____. a. | reflection | c. | refraction | b. | absorption | d. | scattering |

____ 14. Which describes the natural loss of signal strength through space? a. | scattering | c. | free space loss | b. | absorption | d. | delay spread |

____ 15. Which is a method of measuring RF power that can be used as a comparison between two values and gives a better picture of the loss or gain? a. | continuous scale | c. | absolute scale | b. | linear scale | d. | relative scale |

____ 16. What units are used to measure RF power gain and loss on a relative scale? a. | dB | c. | mW | b. | V | d. | ohm |

____ 17. Which value can be measured by the circuitry on a wireless NIC to determine if it is clear to send its transmission? a. | dB | c. | mW | b. | RSSI | d. | SNR |

____ 18. What is the term that describes the ratio of desired signal to undesired signal in the average power level of a transmission? a. | SNR | c. | RSSI | b. | dBm | d. | FSPL |

____ 19. What is the positive difference in amplitude between two signals? a. | propagation | c. | refraction | b. | gain | d. | delay spread |

____ 20. Which is caused by small objects or rough surfaces as an RF signal travels through the air? a. | reflection | c. | scattering | b. | refraction | d. | nullification |

____ 21. What phenomenon is described as multiple copies of a signal that reach a receiver at different times? a. | propagation | c. | multimode | b. | multipath | d. | multi-directional |

____ 22. What does a loss of 10 decibels mean with respect to the percent of power loss in mW? a. | 50% | c. | 30% | b. | 10% | d. | 90% |

Multiple Response
Identify one or more choices that best complete the statement or answer the question.

____ 23. Which of the following are characteristics of electromagnetic waves (Choose all that apply.) a. | square | c. | discrete | b. | continuous | d. | cycle |

____ 24. Which of the following are advantages of digital modulation over analog moduation? (Choose all that apply.) a. | makes better use of the available spectrum | c. | more power is required to transmit | b. | performs better when interference is present | d. | frequency and phase changes occur continuously |

____ 25. Which of the following are used to describe the behaviors of waves as they propagate? (Choose all that apply.) a. | diffraction | c. | resistance | b. | scattering | d. | absorption |

____ 26. What are the negative effects of delay spread? (Choose all that apply.) a. | upfade | c. | corruption | b. | amplification | d. | nulling |

Complete each statement.

27. A(n) DIGITAL signal has numerous starts and stops throughout the signal stream.

28. Resistance is measured in ohms and the total amount of resistance is called the IMPEDANCE

29. FREQUENCY shift keying is a binary modulation similar to phase modulation.

30. RF power gain and loss on a relative scale are measured in DECIBELS instead of mW.

31. The way in which RG signals travel is referred to as wave ____________.


Match each term with the correct statement below. a. | diffraction | f. | voltage | b. | attenuation | g. | scattering | c. | electrical power | h. | wavelength | d. | oscillating signal | i. | frequency | e. | modulation |

____ 32. voltage multiplied by the current

___D 33. up-and-down wave

___H 34. distance between the peaks of a wave

___I 35. rate at which an event occurs

___A 36. bending caused by an object in the path of the transmission

___E 37. modification to a signal to enable it to carry information

____ 38. equal to current times resistance

___B 39. loss of signal strength

___G 40. occurs when the RF signal comes in contact with elements in the air, such as rain or heavy dust particles

Similar Documents

Free Essay


...Case 05-2: Adoption of Wireless Network Technologies .The number of wireless networks is increasing both in homes and organizations. Surf the Web to locate a service industry in which the use of wireless networks is growing by leaps and bounds. Provide some background information about this particular service industry's adaptation of wireless network technology. Explain some user needs and demands of the network's capabilities, and also offer some examples of the wireless technologies and devices that are in use. Mention any potential threats to the wireless network structure in this industry. Case 06-1: The Future of the Internet .This chapter introduced the history, structure, characteristics, and workings of the Internet. Do some research to obtain information about the efforts that are being made to make the Internet a more powerful and secure system. Write a paper describing these efforts and the parties involved in making this a reality. Case 07-1: The Future of Online Shopping .Use credible sources on the Internet or at your local library to gauge the future of online shopping. Write a summary of your findings and offer reasons for either the expected growth or decline of this Web activity. Do you personally agree with the findings of your research? Why or why not? Conclude by discussing your online shopping experiences and providing examples of items you have purchased online within the past year. Case 08-2: Preventing the Piracy of Multimedia Files .Audio,......

Words: 670 - Pages: 3

Premium Essay

Enhanced Algorithm for Video Adaptation for Small Hand Held Devices(Matlab Simulation)

...Video adaptation for small hand held devices Table of Contents 1.1 Background 1.2 Research problem 1.3 Aim and objectives 1.4 Justification for the research 1.5 Organization of the rest of the chapters 1.6 Summary 1.2 Background Introduction to conventional wisdom has it that communication bandwidth will limit the viability of streaming video applications on wireless terminal devices like cellular telephones, smartphones, personal digital assistants (PDAs) and even compact laptop computers. Even if unlimited wireless bandwidth were suddenly to become available, service providers and terminal device manufacturers would have no assurance they could provide a high-quality streaming video experience, unless the architecture of the terminal device featured a solid foundation for the application and the processing capabilities to pull it off. To be able to cope with the demands of a streaming video application and the vagaries of wireless communication in general, a terminal device must have a unique blend of hardware and software especially well-suited to wireless streaming video [0]. 1.2 Research Problem: Fortunately, this dual-processor architecture is very well suited to wireless streaming video. Because of the strenuous demands of applications like streaming video, a partitioning of the application's tasks between the two processors is critical for several reasons. And second, assigning tasks to the appropriate processor will......

Words: 1148 - Pages: 5

Premium Essay

Ufs Case Study

...LAUDON CHAPTER 1 INFORMATION SYSTEMS IN GLOBAL BUSINESS TODAY UPS Global Operations with the DIAD CASE 1 (a) Global Operations with the DIAD IV URL; L=3:07 Systems (b) UPS’s Next-Generation Mobile Devices Are Here URL; L=3:22 SUMMARY Using smart people and smart technology, UPS delivers over 16 million packages daily to 220 countries and territories, requiring the talents of 70,000 drivers who are wirelessly connected to UPS main databases. This case describes the evolution of the UPS DIAD technology platform, the transition to the new DIAD V in 2013, and the role of information systems in achieving UPS’ strategic business objectives. Two videos. CASE United Parcel Service’s global operations are driven by its information systems technology. What UPS can do is largely a function of its information technology investments. Beginning as a local delivery service in 1907, UPS expanded on the West coast initially, reached New York in the 1930s, and went international in the 1970s. Today, UPS delivers over 16 million packages daily to 220 countries and territories, requiring the talents of 70,000 drivers who are wirelessly connected to UPS databases located in seventeen major data centers throughout the world. UPS maintains a fleet of 95,000 delivery vehicles, and 230 aircraft worldwide. continued Chapter 1, Case 1...

Words: 1559 - Pages: 7

Premium Essay

Management Informaton Systems

...Management Information Systems 13e KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 1 INFORMATION SYSTEMS IN GLOBAL BUSINESS TODAY UPS Global Operations with the DIAD CASE 1 (a) Global Operations with the DIAD IV VIDEO CASE Systems URL; L=3:07 (b) UPS’s Next-Generation Mobile Devices Are Here VIDEO CASE URL; L=3:22 continued Chapter 1, Case 1 UPS Global Operations with the DIAD 2 SUMMARY Using smart people and smart technology, UPS delivers over 16 million packages daily to 220 countries and territories, requiring the talents of 70,000 drivers who are wirelessly connected to UPS main databases. This case describes the evolution of the UPS DIAD technology platform, the transition to the new DIAD V in 2013, and the role of information systems in achieving UPS’ strategic business objectives. Two videos. CASE United Parcel Service’s global operations are driven by its information systems technology. What UPS can do is largely a function of its information technology investments. Beginning as a local delivery service in 1907, UPS expanded on the West coast initially, reached New York in the 1930s, and went international in the 1970s. Today, UPS delivers over 16 million packages daily to 220 countries and territories, requiring the talents of 70,000 drivers who are wirelessly connected to UPS......

Words: 1564 - Pages: 7

Premium Essay

Instruction Plan

...publication 2006 Other Specific Book: 2 Andrew S. Tanenbaum,Computer Network 2nd Edition, PHI, Third Edition 1997 3 Comer E. Doughlas,Computer Networks and Internets, 2nd Ed., Pearson, 2000 4 W. Stallings,Data and Computer Communications, 7th Ed., Pearson, 2002. 5 Black U,Computer Networks-Protocols, Standards and Interfaces, PHI 1996 Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) Relevant Websites Sr. No. (Web adress) (only if relevant to the courses) 6 7 8 9 Salient Features Website on reference book Website on reference book website on text book Provides information on basic concepts of networking 10 Networking Basics - Key Concepts in Computer Networking /Networking_Basics_Key_Concepts_in_Computer_Networking .htm 1 Approved for Spring Session 2011-12 11 Tools required to understand the course: Boson Netsim / Packet Tracer acketTracer.html Detailed Plan For Lectures Week Number Lecture Number Lecture Topic Chapters/Sections of Pedagogical tool Textbook/other Demonstration/case reference study/images/anmatio n ctc. planned Part 1 Week 1 Lecture 1 Lecture 2 Lecture 3 Lecture 4 Week 2 Lecture 5 Lecture 6 Lecture 7......

Words: 1513 - Pages: 7

Premium Essay


...Assignment Instructions: Please answer the following End of Chapter Exercises from Chapters 1-4 of your text. Chapter 1 - Introduction and Overview 1.3 According to the text, is it possible to develop Internet applications without understanding the architecture of the Internet and the technologies? Support your answer. According to the text, it is possible but understanding the architecture will allow the developer to produce a better application. Having an understanding will result in “a programmer creat[ing] more reliable, correct, and efficient programs.” 1.11 List the layers in the TCP/IP model, and give a brief explanation of each. Layer 1: Physical, this layer deals with the physical aspects, particularly the hardware involved. Layer 2: Network Interface/Data Link, this layer deals with communication between higher layers of protocols, involving both software and hardware, including packet sizes. Layer 3: Internet, this layer deals with communication between computers across the internet. Other packet details are included in this layer. Layer 4: Transport, this layer deals with communication between applications between different computers. Flow of internet traffic is included in this layer. Layer 5: Application, this layer deals with the interaction of applications once they begin communicating. Formats and ways of applications communicating are in this layer. Chapter - 2 Internet Trends 2.9 What Internet technology is the......

Words: 583 - Pages: 3

Premium Essay

Ip Networking Assignment 1.1

...1.1 Chapter 1 1. The TCP/IP networking model is a model of networking functions that are separated into different layers. Each layer performs a specific function that effects the layer above and below it. We use the TCP/IP model to troubleshoot a computer that is experiencing network issues. 2. There are seven different layers in an OSI model. Layer 1 (Physical layer): the physical characteristics of a computer such as connectors and pins. Layer 2 (Data Link): defines the internet protocols and the format of a header and trailer that allows devices to send and receive data successfully. Layer 3 (Network): routing IP packets and IP addressing. Layer 4 (Transport): data delivery from one computer to another. Layer 5 (Session): User communicating with the computer. Layer 6 (Presentation): defining data formats such as text files (.txt) and picture files (JPEG). Layer 7 (Application): support for applications such email and internet explorer. 3. The difference between same layer and adjacent layer interactions is that same layer deals with two computers, while adjacent with just one computer. 4. Encapsulation is the process of placing data into a header and footer. Decapsulation is the process of removing data from a header and footer. Chapter 2 1. There are five different types of Ethernet which are 10Base2, 10Base5, 10Base-T, 100Base-TX, and 1000Base-T. Also there are many different types of topologies such as bus, star, mesh, extended star, and token ring. 2.......

Words: 726 - Pages: 3

Free Essay

Wireless Dc Motor Speed and Direction Control Using Rf Communication

...An Industry-oriented Mini-Project Report on WIRELESS DC MOTOR SPEED AND DIRECTION CONTROL USING RF COMMUNICATION Submitted to Department of Electronics and Communication Engineering Mahaveer Institute of Science and Technology (Approved by AICTE) and affiliated to JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY Hyderabad, (A.P.). in partial fulfillment of the Requirement for the award of Degree of BACHELOR OF TECHNOLOGY in Electronics & Communication Engineering Submitted By K. Vinay 08E31A04C8 GUIDE MINI-PROJECT COORDINATOR HEAD OF DEPT. Mr. Sridhar Chitta Mr. M. Nagaraju Naik Dr. B. Visvesvara Rao . MAHAVEER INSTITUTE OF SCIENCE & TECHNOLOGY Vyasapuri, Bandlaguda, Post: Keshavgiri, Hyderabad – 500 005 2011 - 2012 CERTIFICATE This is to certify that the mini project work titled WIRELESS DC MOTOR SPEED AND DIRECTION CONTROL USING RF COMMUNICATION, which is being submitted By K. Vinay 08E31A04C8 in partial fulfilment for the award of Degree of Bachelor of Technology in Electronics and Communication Engineering to the Mahaveer Institute of Science and Technology, affiliated to Jawaharlal Nehru Technological University and is a bonafide record of work carried out by them under our supervision. The results embodied in this mini-project report have not been submitted to any other University or Institute for the award of any degree or diploma. Project Guide Project Coordinator ......

Words: 1425 - Pages: 6

Free Essay

The Impact of Wireless Technology in a School Environment

...ABSTRACT The study examined the impact of wireless technology in a learning environment. The main research instrument used is through the administration of questionnaires. The feedbacks were analyzed, the result showed that Information Technology has positive effect on learning environment. In conclusion, the study has shown that Information Technology has extensively improved the communication links between students, teachers and parent alike. This has greatly enhanced teachers teaching method by practically demonstrating how stuffs work and be able to communicate together in a small global village. In effects, the research work show the importance of wireless technology as a mean of teaching aids that allows dissemination of information within a wider coverage in no time. In operational efficiency, this has reduced running cost, reduced transaction time, swift response in Service delivery and student/teacher satisfaction to mention a few. 6 TABLE OF CONTENTS Title page I Declaration II Certification III Acknowledgement IV Abstract V Table of contents VI List of Tables IX CHAPTER 1 INTRODUCTION 1.1 Background to the Study 1 1.2 Statement of the Problem 3 1.3 Research Questions 4 1.4 Purpose of the Study 4 1.5 ......

Words: 1511 - Pages: 7

Premium Essay


...Chapter 1 R4. List six access technologies. Classify each one as home access, enterprise access, or wide-area wireless access. * For Home access we can use the following access technologies: 1. Dial-up modem over telephone line 2. DSL over telephone line: residential or small office In locations where DSL, cable, and FTTH are not available (e.g., in some rural settings), a satellite link can be used to connect a residence to the Internet at speeds of more than 1 Mbps; StarBand and HughesNet are two such satellite access providers. Dial-up access over traditional phone lines is based on the same model as DSL—a home modem connects over a phone line to a modem in the ISP. Compared with DSL and other broadband access networks, dial-up access is excruciatingly slow at 56 kbps. 3. Cable to HFC: residential; While DSL makes use of the telco’s existing local telephone infrastructure, cable Internet access makes use of the cable television company’s existing cable television infrastructure. A residence obtains cable Internet access from the same company that provides its cable television. Each neighborhood junction typically supports 500 to 5,000 homes. Because both fiber and coaxial cable are employed in this system, it is often referred to as hybrid fiber coax (HFC). * For use at firms or enterprise access 4. 100 Mbps switched Etherent Ethernet is by far the most prevalent access technology in corporate, university, and home networks. The Ethernet switch, or a......

Words: 687 - Pages: 3

Premium Essay

E Business

...CHAPTER 1 1.       How do you define Electronic Commerce EC involves conducting transactions electronically. Major categories of EC are pure versus partial EC, Internet versus non-Internet, and electronic markets versus company based systems. 2.       Major types of EC transactions -          B2C,B2B, C2C, c-commerce, e-government, social commercing 3.       What are elements of digital world? -          Digital economy, digital enterprises and digital society CHAPTER 2 1.       What does E-marketplace prepresents and what are its components. e-marketplace or marketspae, is a virtual market that does not suffer from limitations of space, time or borders. Its major components are customers, sellers, products, infrastructure, front-end processes, back-end activities, electronic intermediaries, other business partners, and support services. 2.       What are characteristics of Web 3.0 -          Web 3.0 is definedas connective intelligence; connecting data, concepts, applications and ultimately people. 3.       What are main benefits and limitations of auctions -          Major benefits for sellers are the ability to reach many buyers, sell quicklly, and safe on intermediary commissions. CHAPTER 3 1.       E-tailing as a business models? It can be classified by distrubution channel – a manufacturer or mail.order company selling directly to consumers, virtual e-tailing, a click and mortar strategy with both online and traditional channels, and online malls that......

Words: 800 - Pages: 4

Premium Essay


...Chapter: 07 Telecommunications, The Internet and Wireless Technology 1. Question: What are the principal components of telecommunications networks and key networking technologies? Answer: The principal components of telecommunications networks: Telecommunications are the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks. These networks themselves are run by computers. A telecommunications network is an arrangement of computing and telecommunications resources for communication of information between distant locations. A telecommunications network includes the following components: Figure: principal components of a simple computer network 1. Computer: Computers that process information and are interconnected by the network 2. Network Interface: Each computer on the network contains a network interface device called a network interface card (NIC). 3. A Connection medium: The connection medium for linking network components can be a telephone wire, Coaxial cable or radio signal in the case of cell phone and wireless local area networks. 4. Network operating System software: The network operating system (NOS) routes and manages communications on the network and coordinates network resources. ...

Words: 1634 - Pages: 7

Premium Essay

Internet Of Things Essay Examples

...concept of Internet of Things was first coined in 1999 by a member of Radio Frequency Identification (RFID) development community, and it has become more relevant to the practical world of today due to the evolution of chips, sensors, mobile devices, embedded and pervasive communication, data analytics and cloud computing, etc. The convergence of effective wireless protocols, enhanced sensors, cost-effective processors, and a number of established and start ups companies developing the essential applications and management software has eventually made the conception of the Internet of Things in mainstream. By installing tiny size, short-range mobile transceivers into everyday items and to additional gadgets which can enables new forms of communication between objects and people, and between objects themselves, Interenet of Things (IoT) would become a new dimension to the world of information and communication. These programmed objects has RFID communication technology, embedded technology, wireless...

Words: 784 - Pages: 4

Free Essay

Chapter 1

...Chapter 1: IT Support of Organizational Performance in Turbulent Business Environments The Wireless Café in Shanghai offers fantastic food in a whimsical décor.  The chef’s contemporary interpretation of classical Chinese cuisine gives foodies a reason to indulge, and its location on the famous Bund along the Huangpu River makes it a destination for locals and visitors alike.  The free wireless Internet access and table-to-table instant messaging help to create a community where regulars return time after time.   Your academic achievements, coupled with your major advisor’s connections have landed you a summer internship at the Wireless Cafe and you have just settled into your Shanghai apartment for the summer.  Your initial interview with Jade Leung, co-owner of the Wireless Cafe has piqued your interest in restaurant operations, and you are now on your way to meet Jade’s husband and restaurant co-owner Jimmy Kwok.  Jimmy is the Wireless Café’s office manager and accountant with whom you will be working closely this summer.   Jimmy has created a web site for the Wireless Cafe that provides information on the restaurant’s location, décor, and cuisine in addition to a web portal for employees only.  You should view it before answering the following questions.     1. What did you learn about the Wireless Cafe from their web site?             a. What kind of food does the Wireless Café feature?               b. What are the attractions of the Wireless......

Words: 651 - Pages: 3

Premium Essay

This Is a Paper

...Wireless DoS Attacks: Deauthentication-Disassociation Flood Attack There are several benefits and limitations of the 802.11 wireless standard. Benefits include mobility, ease of deployment, and flexibility, but the drawbacks include limited bandwidth when compared to wired connections and security features, since anyone within transmission range can collect communications (University of Maryland University College, 2012, pp. 5-6). As noted in Module 9, there are a variety of ways that WEP and WPA/WPA2 authentication can be circumvented. Notably, WEP is prone to FMS Attacks (including Korek and PTW variations) and ChopChop Attacks (University of Maryland University College, 2012, pp. 29-40). WPA and WPA2 are vulnerable to brute-force dictionary attacks (pp. 41-46). And Bluetooth is susceptible to a variety of attacks, including: bluesnarfing, bluejacking, bluebugging, car whisperer and fuzzing (pp. 47-48). According to Symantec’s Jonathan Hassell, in his 2010 article “Wireless Attacks and Penetration Testing”, there are three types of wireless network attacks: Denial of Service (DoS), man in the middle, and ARP Poisoning. Missing from his list is key-cracking or bypassing wireless authentication, but Hassell does not consider this a pure attack (p. 1). Regardless of Hassell’s definition of a wireless attack, there are a variety of attacks not provided within Module 9 that deserve consideration. The DoS attack focuses on denying the availability of a resource. Albert...

Words: 805 - Pages: 4